auth0-expo
Auth0 Expo Integration
Add authentication to Expo (React Native) applications using react-native-auth0 with the Expo Config Plugin.
Agent instruction: Before providing SDK setup instructions, fetch the latest release version by running:
gh api repos/auth0/react-native-auth0/releases/latest --jq '.tag_name'Use the returned version in all dependency lines instead of any hardcoded version below. If the command fails, fall back to checking https://github.com/auth0/react-native-auth0/releases.
Prerequisites
- Expo SDK 53 or higher (react-native-auth0 v5.x requires Expo 53+)
- React 19 and React Native 0.78.0 or higher
- Node.js 20+ (for bootstrap script automation)
- Auth0 account with a Native application configured
- If Auth0 is not set up yet, use the
auth0-quickstartskill first - Not compatible with Expo Go — requires custom development client or EAS Build
When NOT to Use
| Use Case | Recommended Skill |
|---|---|
| Bare React Native CLI project (no Expo) | auth0-react-native |
| React web SPA (Vite/CRA) | auth0-react |
| Next.js application | auth0-nextjs |
| Vue.js SPA | auth0-vue |
| Angular SPA | auth0-angular |
| Express.js backend | auth0-express |
| Native Android (Kotlin/Java) | auth0-android |
| Backend API (JWT validation) | auth0-fastify-api or auth0-express |
Quick Start Workflow
Agent instruction: First, check whether the user's prompt already includes both Auth0 Client ID and Domain.
- If both are provided, skip the setup-choice question and proceed directly to Step 2 (Verify Expo Dev Client) using those values.
- If either value is missing, ask the user using
AskUserQuestion: "How would you like to configure Auth0 for this Expo project?"
- Automatic setup (Recommended) — runs a bootstrap script that creates the Auth0 app, database connection, callback URLs, and writes the plugin config to app.json
- Manual setup — the user provides their Auth0 Client ID and Domain
Follow the matching section below based on their choice.
1. Configure Auth0
Automatic Setup
Agent instruction: Run these quick checks before the bootstrap script. Do NOT run
auth0 loginfrom the agent — it is interactive and will hang.
- Check Node.js:
node --version. If missing or below 20, ask user: install (brew install node) or switch to manual setup.- Check Auth0 CLI:
command -v auth0. If missing, ask user: install (brew install auth0/auth0-cli/auth0) or switch to manual setup.- Check Auth0 login:
auth0 tenants list --csv --no-input 2>&1. If it fails or returns empty:
- Tell the user: "Please run
auth0 loginin your terminal and let me know when done."- Wait for the user to confirm, then re-run the check to verify.
- Confirm active tenant: Parse the
→line from the CSV output to identify the active tenant domain. Tell the user: "Your active Auth0 tenant is:<domain>. Is this the correct tenant?"
- If yes, proceed.
- If no, ask the user to run
auth0 tenants use <tenant-domain>in their terminal, then re-run step 3 to confirm the new active tenant.Once confirmed, run the bootstrap script:
cd <path-to-skill>/auth0-expo/scripts npm install node bootstrap.mjs <path-to-expo-project>The script validates the Expo project, creates a Native Auth0 application, sets up a database connection, and writes the plugin config to app.json. The agent should NOT handle client_id or domain manually.
If the script fails due to session expiry, ask the user to run
auth0 loginagain, then re-run the script. For other failures, fall back to Manual Setup below.After the script completes, proceed to Step 2 (Verify Expo Dev Client).
Manual Setup (User-Provided Credentials)
Agent instruction: Ask the user for their Auth0 credentials using
AskUserQuestion:"I need your Auth0 credentials to set up authentication. Please provide:
- Auth0 Domain (e.g.,
your-tenant.us.auth0.com)- Client ID (a 32-character alphanumeric string)
You can find both in the Auth0 Dashboard under Applications > Applications > your app > Settings. If you don't have an Auth0 app yet, create one with type Native and copy the domain and client ID from the settings page."
Then write the configuration to app.json and proceed to Step 2.
2. Verify Expo Dev Client
Agent instruction: Before installing the Auth0 SDK, check if the project has
expo-dev-clientinstalled. Read the project'spackage.jsonand look forexpo-dev-clientindependenciesordevDependencies.
If
expo-dev-clientis found: Proceed to step 3.If
expo-dev-clientis NOT found: UseAskUserQuestionwith the following message:"The
react-native-auth0SDK requires a custom Expo development client — it does not work with Expo Go. Your project does not haveexpo-dev-clientinstalled.How would you like to proceed?
- Install it for me — I'll run
npx expo install expo-dev-clientand continue setup- I'll set it up myself — skip this step and continue to Auth0 SDK installation"
If the user picks option 1, run:
npx expo install expo-dev-clientThen proceed to step 3. If option 2, proceed to step 3 directly.
3. Install SDK
npx expo install react-native-auth0
4. Configure Expo Config Plugin
Add the react-native-auth0 plugin to app.json (or app.config.js) with your Auth0 domain and a custom scheme. Also ensure bundleIdentifier (iOS) and package (Android) are set:
{
"expo": {
"ios": { "bundleIdentifier": "com.yourcompany.yourapp" },
"android": { "package": "com.yourcompany.yourapp" },
"plugins": [
["react-native-auth0", {
"domain": "YOUR_AUTH0_DOMAIN",
"customScheme": "YOUR_CUSTOM_SCHEME"
}]
]
}
}
The customScheme must be all lowercase with no special characters (e.g., auth0sample). See Setup Guide for HTTPS callbacks, multiple domains, EAS Build, and secret management.
Agent instruction: If you used automatic setup (Step 1), the bootstrap script already wrote the plugin config to app.json — verify it's correct but do not overwrite it. If you used manual setup, write the config now using the user-provided domain and a custom scheme.
5. Configure Callback URLs
Add to Allowed Callback URLs and Allowed Logout URLs in the Auth0 Dashboard:
YOUR_CUSTOM_SCHEME://YOUR_AUTH0_DOMAIN/ios/YOUR_BUNDLE_ID/callback,
YOUR_CUSTOM_SCHEME://YOUR_AUTH0_DOMAIN/android/YOUR_PACKAGE/callback
All values must be lowercase with no trailing slash. For HTTPS callback URLs (App Links / Universal Links), see Setup Guide.
6. Add Authentication with Auth0Provider
Wrap your app with Auth0Provider and use the useAuth0 hook:
Agent instruction: Before adding new UI elements, search the project for existing click handlers for login, logout, sign-in, or sign-out buttons. If existing handlers are found, hook the Auth0 code into them. Only create new buttons if no existing handlers are found.
import React from 'react';
import { Auth0Provider, useAuth0 } from 'react-native-auth0';
import { View, Button, Text, ActivityIndicator } from 'react-native';
function HomeScreen() {
const { authorize, clearSession, user, isLoading, error } = useAuth0();
const login = async () => {
try {
await authorize(
{ scope: 'openid profile email' },
{ customScheme: 'YOUR_CUSTOM_SCHEME' }
);
} catch (e) {
console.error('Login error:', e);
}
};
const logout = async () => {
try {
await clearSession({ customScheme: 'YOUR_CUSTOM_SCHEME' });
} catch (e) {
console.error('Logout error:', e);
}
};
if (isLoading) {
return <ActivityIndicator size="large" />;
}
return (
<View>
{user ? (
<>
<Text>Welcome, {user.name}!</Text>
<Text>{user.email}</Text>
<Button title="Log Out" onPress={logout} />
</>
) : (
<Button title="Log In" onPress={login} />
)}
{error && <Text>{error.message}</Text>}
</View>
);
}
export default function App() {
return (
<Auth0Provider
domain="YOUR_AUTH0_DOMAIN"
clientId="YOUR_AUTH0_CLIENT_ID"
>
<HomeScreen />
</Auth0Provider>
);
}
7. Build & Verify
Agent instruction: After completing the integration, build the project to verify it compiles:
npx expo prebuild --clean npx expo run:ios # or npx expo run:androidIf the build fails, analyze the error output. Common integration build failures include:
- "Invariant Violation: Native module cannot be null": Using Expo Go instead of a development build — run
npx expo run:iosornpx expo run:androidinstead ofnpx expo start- Plugin not applied: Missing
react-native-auth0in app.json plugins array — verify the plugin configuration- Pod install fails (iOS): Run
npx expo prebuild --cleanto regenerate native projects- Manifest merge failure (Android): Conflicting auth0Domain placeholder — ensure only the config plugin sets the domain
Re-run the build after each fix. Track the number of build-fix iterations.
Failcheck: If the build still fails after 5–6 fix attempts, stop and ask the user using
AskUserQuestion: "The build is still failing after several fix attempts. How would you like to proceed?"
- Let the skill continue fixing iteratively
- Fix it manually — show the remaining errors
- Skip build verification — proceed without a successful build
Detailed Documentation
- Setup Guide — Dev client requirement, automated setup, Expo config plugin, callback URLs, EAS Build, secret management
- Integration Patterns — Login/logout, credential management, biometric auth, token refresh, organizations, DPoP, error handling
- API Reference & Testing — Configuration options, useAuth0 hook API, testing checklist, common issues, security
Common Mistakes
| Mistake | Fix |
|---|---|
| Using Expo Go instead of development build | react-native-auth0 requires native code. Use npx expo run:ios / npx expo run:android or create a development build with EAS. |
Missing customScheme in authorize/clearSession calls |
Pass { customScheme: 'your-scheme' } as the second argument to authorize() and clearSession(). Must match the value in app.json plugin config. |
| Callback URL mismatch | Ensure callback URL is all lowercase, no trailing slash, and matches Auth0 Dashboard exactly: {customScheme}://{domain}/ios/{bundleId}/callback |
| App type not set to Native | The Auth0 application must be type Native in the Dashboard, not SPA or Regular Web. |
| Missing bundleIdentifier or package in app.json | Both expo.ios.bundleIdentifier and expo.android.package must be set in app.json for callback URLs to work. |
| Forgot to wrap app with Auth0Provider | All components using useAuth0() must be children of Auth0Provider. |
| Using react-native-auth0 v5.x with Expo < 53 | Version 5.x requires Expo 53+. Use v4.x for older Expo versions. |
| Not testing on physical device | Biometric authentication (Face ID, fingerprint) only works on a physical device, not simulators. Always test the full auth flow on a real device before release. |
Related Skills
- auth0-quickstart — Set up an Auth0 account and application
- auth0-react-native — Bare React Native CLI projects
- auth0-mfa — Configure multi-factor authentication
- auth0-cli — Manage Auth0 resources from the terminal
References
More from auth0/agent-skills
auth0-quickstart
Use when adding authentication or login to any app - detects your stack (React, Next.js, Vue, Nuxt, Angular, Express, Fastify, FastAPI, ASP.NET Core, React Native, Expo, Android, Swift), sets up an Auth0 account if needed, and routes to the correct SDK setup workflow.
1.4Kauth0-react
Use when adding authentication to React applications (login, logout, user sessions, protected routes) - integrates @auth0/auth0-react SDK for SPAs with Vite or Create React App
780auth0-react-native
Use when adding authentication to React Native or Expo mobile apps (iOS/Android) with biometric support - integrates react-native-auth0 SDK with native deep linking
476auth0-express
Use when adding authentication (login, logout, protected routes) to Express.js web applications - integrates express-openid-connect for session-based auth.
379auth0-mfa
Use when adding MFA, 2FA, TOTP, SMS codes, push notifications, passkeys, or when requiring step-up verification for sensitive operations or meeting compliance requirements (HIPAA, PCI-DSS) - covers adaptive and risk-based authentication with Auth0.
364auth0-angular
Use when adding authentication to Angular applications with route guards and HTTP interceptors - integrates @auth0/auth0-angular SDK for SPAs
317