Auth0Net.DependencyInjection
6.0.0
dotnet add package Auth0Net.DependencyInjection --version 6.0.0
NuGet\Install-Package Auth0Net.DependencyInjection -Version 6.0.0
<PackageReference Include="Auth0Net.DependencyInjection" Version="6.0.0" />
<PackageVersion Include="Auth0Net.DependencyInjection" Version="6.0.0" />
<PackageReference Include="Auth0Net.DependencyInjection" />
paket add Auth0Net.DependencyInjection --version 6.0.0
#r "nuget: Auth0Net.DependencyInjection, 6.0.0"
#:package Auth0Net.DependencyInjection@6.0.0
#addin nuget:?package=Auth0Net.DependencyInjection&version=6.0.0
#tool nuget:?package=Auth0Net.DependencyInjection&version=6.0.0
Auth0.NET Dependency Injection Extensions
<h1 align="center"> <img align="center" src="https://user-images.githubusercontent.com/975824/128343470-8d97e39d-ff8a-4daf-8ebf-f9039a46abd6.png" height="130px" /> </h1>
Integrating Auth0.NET into your project whilst following idiomatic .NET conventions can be cumbersome and involve a sizable amount of boilerplate shared between projects.
This library hopes to solve that problem, featuring:
✅ Extensions for Microsoft.Extensions.DependencyInjection.
✅ Automatic access token caching & renewal for the Management API and your own REST & Grpc services
✅ HttpClientFactory integration for centralized extensibility and management of the internal HTTP handlers.
✅ IHttpClientBuilder extensions, providing handlers to automatically append access tokens to outgoing requests.
This library is compatible with .NET 8+ as well as .NET Framework 4.8 and is suitable for use in ASP.NET Core and standalone .NET Generic Host applications.
Install
Add Auth0Net.DependencyInjection to your project:
dotnet add package Auth0Net.DependencyInjection
Scenarios
Authentication Client Only

If you're simply using the AuthenticationApiClient and nothing else, you can call AddAuth0AuthenticationClient and pass in your Auth0 Domain. This integration is lightweight and does not support any other features of this library.
services.AddAuth0AuthenticationClient("your-auth0-domain.auth0.com");
You can then request the IAuthenticationApiClient within your class:
public class AuthController : ControllerBase
{
private readonly IAuthenticationApiClient _authenticationApiClient;
public AuthController(IAuthenticationApiClient authenticationApiClient)
{
_authenticationApiClient = authenticationApiClient;
}
Authentication Client + Management Client

Add the AuthenticationApiClient with AddAuth0AuthenticationClient, and provide a machine-to-machine application configuration that will be consumed by the Management Client, Token Cache and IHttpClientBuilder integrations. This extension must be called before using any other extensions within this library:
services.AddAuth0AuthenticationClient(config =>
{
config.Domain = builder.Configuration["Auth0:Domain"];
config.ClientId = builder.Configuration["Auth0:ClientId"];
config.ClientSecret = builder.Configuration["Auth0:ClientSecret"];
});
Add the ManagementApiClient with AddAuth0ManagementClient(). The client will attach the Access Token automatically:
services.AddAuth0ManagementClient();
Ensure your Machine-to-Machine application is authorized to request tokens from the Managment API and it has the correct scopes for the features you wish to use.
You can then request the IManagementApiClient (or IAuthenticationApiClient) within your services:
public class MyAuth0Service : IAuth0Service
{
private readonly IManagementApiClient _managementApiClient;
public MyAuth0Service(IManagementApiClient managementApiClient)
{
_managementApiClient = managementApiClient;
}
Handling Custom Domains
If you're using a custom domain with your Auth0 tenant, and it's being specified when calling AddAuth0AuthenticationClient, you will run into a problem whereby the audience of the Management API is being incorrectly set. You can override this via the Audience property:
services.AddAuth0ManagementClient(c =>
{
// Set the audience to your default Auth0 domain.
c.Audience = "my-tenant.au.auth0.com";
});
External HttpClient & Grpc Services (Machine-To-Machine Tokens)

Note: This feature relies on services.AddAuth0AuthenticationClient(config => ...) being called and configured as outlined in the previous section.
This library includes a delegating handler - effectively middleware for your HttpClient - that will append an access token to all outbound requests. This is useful for calling other services that are protected by Auth0. This integration requires your service implementation to use IHttpClientFactory as part of its registration. You can read more about it here
HttpClient
Use AddAccessToken along with the required audience:
services.AddHttpClient<MyHttpService>(x => x.BaseAddress = new Uri(builder.Configuration["MyHttpService:Url"]))
.AddAccessToken(config => config.Audience = builder.Configuration["MyHttpService:Audience"]);
Grpc
This extension is compatible with any registration that returns a IHttpClientBuilder, thus it can be used with Grpc's client factory:
services.AddGrpcClient<UserService.UserServiceClient>(x => x.Address = new Uri(builder.Configuration["MyGrpcService:Url"]))
.AddAccessToken(config => config.Audience = builder.Configuration["MyGrpcService:Audience"]);
Advanced
AddAccessToken also has an option for passing in a func that can resolve the audience at runtime. This can be useful if your expected audiences always follow a pattern, or if you rely on service discovery, such as from Steeltoe.NET:
services.AddHttpClient<MyHttpService>(x=> x.BaseAddress = new Uri("https://MyServiceName/"))
.AddServiceDiscovery()
.AddAccessToken(config => config.AudienceResolver = request => request.RequestUri.GetLeftPart(UriPartial.Authority));
M2M Organizations Support
This library includes support for Machine-to-Machine (M2M) Access for Organizations, including static and dynamic scenarios. This feature is important if your internal or third-party services expect a token to be scoped to a specific Auth0 organization.
Orgs support must be enabled for your combination of client/api/org(s) before usage.
Static Organization
Clients that simply require a single organization for a specific client can do so via setting the Organization property when configuring the access token:
builder.Services
.AddGrpcClient<UserService.UserServiceClient>(x => x.Address = new Uri(builder.Configuration["AspNetCore:Url"]!))
.AddAccessToken(config =>
{
config.Audience = builder.Configuration["AspNetCore:Audience"];
config.Organization = builder.Configuration["AspNetCore:Audience"];
});
Dynamic Organization via Request Metadata
If you already include org metadata as part of your network request or via the request options and would like to easily migrate to Org-scoped tokens, you can choose to resolve the organization at runtime via the OrganizationResolver:
builder.Services
.AddGrpcClient<UserService.UserServiceClient>(x => x.Address = new Uri(builder.Configuration["AspNetCore:Url"]!))
.AddAccessToken(config =>
{
config.Audience = builder.Configuration["AspNetCore:Audience"];
config.OrganizationResolver = x =>
x.Headers.TryGetValues("org-id", out var values)
? values.SingleOrDefault()
: null;
});
Dynamic Organization via Client Scope (Experimental)
If your organization source is scoped to the usage of your service, such as an ASP.NET Core request, then you'll want the ability to freely set the Organization.
You can achieve this by injecting your client via OrganizationScopeFactory<TClient> and then creating an organization scope via .CreateScope:
// Inject the factory around your remote client
private readonly OrganizationScopeFactory<UsersService> _scopeFactory;
public QueryUsersService(OrganizationScopeFactory<UsersService> scopeFactory)
{
_scopeFactory = scopeFactory;
}
public async Task CreateUserAsync(User user, string orgId)
{
// Create the scope so the MTM token is generated with the current OrgId
using var orgScope = _scopeFactory.CreateScope(orgId);
await orgScope.Client.CreateUser(user, stoppingToken);
}
ALWAYS ensure you dispose of the scope when finished.
There's a few limitations if you're using this functionality, as it uses AsyncLocal internally:
- Never use multiple client scopes at the same time, either with the same or different client types. This will throw an exception.
- Never call any other client that utilizes
.AddAccessTokenwithin a client scope. This may cause the wrong Organization ID/Name being used for a given request.
If you have a use-case for either of these items, please open an issue with an example.
This functionality is marked as experimental, and you must #pragma warning disable AUTH0_EXPERIMENTAL to use it.
Additional Functionality
Utility
This library exposes a simple string extension, ToHttpsUrl(), that can be used to format the naked Auth0 domain sitting in your configuration into a proper URL.
This is identical to https://{Configuration["Auth0:Domain"]}/ that you usually end up writing somewhere in your Program.cs.
For example, formatting the domain for the JWT Authority:
.AddJwtBearer(options =>
{
// "my-tenant.auth0.com" -> "https://my-tenant.auth0.com/"
options.Authority = builder.Configuration["Auth0:Domain"].ToHttpsUrl();
//...
});
Internals
Client Lifetimes
Both the authentication and authorization clients are registered as singletons and are suitable for injection into any other lifetime.
Samples
Both a .NET Generic Host and ASP.NET Core examples are available in the samples directory.
Internal Cache
The Auth0TokenCache will cache a token for a given audience until at least 95% of the expiry time. If a request to the cache is made between 95% and 99% of expiry, the token will be refreshed in the background before expiry is reached.
An additional 1% of lifetime is removed to protect against clock drift between distributed systems.
In some situations you might want to request an access token from Auth0 manually. You can achieve this by injecting IAuth0TokenCache into a class and calling GetTokenAsync with the audience of the API you're requesting the token for.
An in-memory-only instance of FusionCache is used as the caching implementation. This instance is named and will not impact other usages of FusionCache.
If you want to use your own implementation of FusionCache, specify FusionCacheInstance when configurating the authentication client:
services.AddAuth0AuthenticationClient(x =>
{
//...
// Use the default FusionCache instance registered via `.AddFusionCache()`
x.FusionCacheInstance = FusionCacheOptions.DefaultCacheName
});
Disclaimer
I am not affiliated with nor represent Auth0. All implementation issues regarding the underlying ManagementApiClient and AuthenticationApiClient should go to the official Auth0.NET Respository.
License notices
Icons used under the MIT License from the Identicons pack.
| Product | Versions Compatible and additional computed target framework versions. |
|---|---|
| .NET | net8.0 is compatible. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-maccatalyst was computed. net8.0-macos was computed. net8.0-tvos was computed. net8.0-windows was computed. net9.0 is compatible. net9.0-android was computed. net9.0-browser was computed. net9.0-ios was computed. net9.0-maccatalyst was computed. net9.0-macos was computed. net9.0-tvos was computed. net9.0-windows was computed. net10.0 is compatible. net10.0-android was computed. net10.0-browser was computed. net10.0-ios was computed. net10.0-maccatalyst was computed. net10.0-macos was computed. net10.0-tvos was computed. net10.0-windows was computed. |
| .NET Framework | net48 is compatible. net481 was computed. |
-
.NETFramework 4.8
- Auth0.AuthenticationApi (>= 7.45.1)
- Auth0.ManagementApi (>= 8.0.0)
- Microsoft.Bcl.AsyncInterfaces (>= 10.0.5)
- Microsoft.Extensions.Configuration.Abstractions (>= 6.0.1)
- Microsoft.Extensions.Http (>= 6.0.1)
- ZiggyCreatures.FusionCache (>= 2.6.0)
-
net10.0
- Auth0.AuthenticationApi (>= 7.45.1)
- Auth0.ManagementApi (>= 8.0.0)
- Microsoft.Bcl.AsyncInterfaces (>= 10.0.5)
- Microsoft.Extensions.Configuration.Abstractions (>= 10.0.0)
- Microsoft.Extensions.Http (>= 10.0.0)
- ZiggyCreatures.FusionCache (>= 2.6.0)
-
net8.0
- Auth0.AuthenticationApi (>= 7.45.1)
- Auth0.ManagementApi (>= 8.0.0)
- Microsoft.Bcl.AsyncInterfaces (>= 10.0.5)
- Microsoft.Extensions.Configuration.Abstractions (>= 8.0.0)
- Microsoft.Extensions.Http (>= 8.0.1)
- ZiggyCreatures.FusionCache (>= 2.6.0)
-
net9.0
- Auth0.AuthenticationApi (>= 7.45.1)
- Auth0.ManagementApi (>= 8.0.0)
- Microsoft.Bcl.AsyncInterfaces (>= 10.0.5)
- Microsoft.Extensions.Configuration.Abstractions (>= 9.0.11)
- Microsoft.Extensions.Http (>= 9.0.11)
- ZiggyCreatures.FusionCache (>= 2.6.0)
NuGet packages
This package is not used by any NuGet packages.
GitHub repositories
This package is not used by any popular GitHub repositories.
| Version | Downloads | Last Updated |
|---|---|---|
| 6.0.0 | 28 | 4/3/2026 |
| 5.2.1 | 196 | 3/31/2026 |
| 5.2.0 | 29,807 | 11/20/2025 |
| 5.1.0 | 80,399 | 5/12/2025 |
| 5.0.0 | 44,769 | 1/30/2025 |
| 4.0.0 | 41,194 | 11/17/2024 |
| 3.2.0 | 102,042 | 3/8/2024 |
| 3.1.0 | 34,752 | 12/21/2023 |
| 3.0.0 | 62,888 | 6/20/2023 |
| 2.0.0 | 133,316 | 11/12/2022 |
| 1.7.0 | 8,386 | 8/30/2022 |
| 1.6.0 | 73,375 | 2/22/2022 |
| 1.5.0 | 15,889 | 8/27/2021 |
| 1.4.1 | 1,285 | 8/5/2021 |
| 1.4.0 | 3,995 | 4/3/2021 |
| 1.3.0 | 1,387 | 12/3/2020 |
| 1.2.0 | 791 | 11/27/2020 |
| 1.1.0 | 837 | 11/24/2020 |
| 1.0.0 | 968 | 11/24/2020 |