{"id":15046635,"url":"https://github.com/auth0/auth0.android","last_synced_at":"2026-01-23T14:02:27.001Z","repository":{"id":37484069,"uuid":"62246133","full_name":"auth0/Auth0.Android","owner":"auth0","description":"Android toolkit for Auth0 API","archived":false,"fork":false,"pushed_at":"2025-03-20T10:16:49.000Z","size":3710,"stargazers_count":242,"open_issues_count":9,"forks_count":151,"subscribers_count":30,"default_branch":"main","last_synced_at":"2025-04-07T06:01:33.003Z","etag":null,"topics":["android","authentication","dx-sdk"],"latest_commit_sha":null,"homepage":"https://auth0.com","language":"Kotlin","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/auth0.png","metadata":{"files":{"readme":"README.md","changelog":"CHANGELOG.md","contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":".github/CODEOWNERS","security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2016-06-29T17:50:35.000Z","updated_at":"2025-03-31T12:24:57.000Z","dependencies_parsed_at":"2023-10-02T18:41:20.863Z","dependency_job_id":"2afffb87-ba17-42eb-9b11-73e7665d7f87","html_url":"https://github.com/auth0/Auth0.Android","commit_stats":null,"previous_names":[],"tags_count":82,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/auth0%2FAuth0.Android","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/auth0%2FAuth0.Android/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/auth0%2FAuth0.Android/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/auth0%2FAuth0.Android/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/auth0","download_url":"https://codeload.github.com/auth0/Auth0.Android/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":248908774,"owners_count":21181590,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["android","authentication","dx-sdk"],"created_at":"2024-09-24T20:53:19.502Z","updated_at":"2026-01-23T14:02:26.946Z","avatar_url":"https://github.com/auth0.png","language":"Kotlin","readme":"\u003e **Note**\n\u003e As part of our ongoing commitment to best security practices, we have rotated the signing keys used to sign previous releases of this SDK. As a result, new patch builds have been released using the new signing key. Please upgrade at your earliest convenience.\n\u003e\n\u003e While this change won't affect most developers, if you have implemented a dependency signature validation step in your build process, you may notice a warning that past releases can't be verified. This is expected, and a result of the key rotation process. Updating to the latest version will resolve this for you.\n\n![Auth0.Android](https://cdn.auth0.com/website/sdks/banners/auth0-android-banner.png)\n\n[![Maven Central](https://img.shields.io/maven-central/v/com.auth0.android/auth0.svg?style=flat-square)](https://search.maven.org/artifact/com.auth0.android/auth0)\n[![Coverage Status](https://img.shields.io/codecov/c/github/auth0/Auth0.Android/master.svg?style=flat-square)](https://codecov.io/github/auth0/Auth0.Android)\n[![CircleCI](https://img.shields.io/circleci/project/github/auth0/Auth0.Android.svg?style=flat-square)](https://circleci.com/gh/auth0/Auth0.Android/tree/master)\n[![License](https://img.shields.io/:license-mit-blue.svg?style=flat-square)](https://doge.mit-license.org/)\n[![javadoc](https://javadoc.io/badge2/com.auth0.android/auth0/javadoc.svg)](https://javadoc.io/doc/com.auth0.android/auth0)\n[![Ask DeepWiki](https://deepwiki.com/badge.svg)](https://deepwiki.com/auth0/Auth0.Android)\n\n📚 [Documentation](#documentation) • 🚀 [Getting Started](#getting-started) • 💬 [Feedback](#feedback)\n\n## Documentation\n- [Quickstart](https://auth0.com/docs/quickstart/native/android/interactive)\n- [Sample App](https://github.com/auth0-samples/auth0-android-sample/tree/master/00-Login-Kt)\n- [FAQs](https://github.com/auth0/auth0.android/blob/main/FAQ.md)\n- [Examples](https://github.com/auth0/auth0.android/blob/main/EXAMPLES.md)\n- [Docs Site](https://javadoc.io/doc/com.auth0.android/auth0/latest/index.html)\n\n\n## Getting Started\n\n### Requirements\n\nAndroid API version 31 or later and Java 8+.\n\n\u003e :warning: Applications targeting Android SDK version 30 (`targetSdkVersion = 30`) and below should use version 2.9.0.\n\nHere’s what you need in `build.gradle` to target Java 8 byte code for Android and Kotlin plugins respectively.\n\n```groovy\nandroid {\n    compileOptions {\n        sourceCompatibility JavaVersion.VERSION_1_8\n        targetCompatibility JavaVersion.VERSION_1_8\n    }\n\n    kotlinOptions {\n        jvmTarget = '1.8'\n    }\n}\n```\n\n### Installation\n\n\nTo install Auth0.Android with [Gradle](https://gradle.org/), simply add the following line to your `build.gradle` file:\n\n```gradle\ndependencies {\n    implementation 'com.auth0.android:auth0:3.12.2'\n}\n```\n\n#### Permissions\n\nOpen your app's `AndroidManifest.xml` file and add the following permission.\n\n```xml\n\u003cuses-permission android:name=\"android.permission.INTERNET\" /\u003e\n```\n\n### Configure the SDK\n\nFirst, create an instance of `Auth0` with your Application information\n\n```kotlin\nval account = Auth0.getInstance(\"{YOUR_CLIENT_ID}\", \"{YOUR_DOMAIN}\")\n```\n\n\u003cdetails\u003e\n  \u003csummary\u003eUsing Java\u003c/summary\u003e\n\n```java\nAuth0 account = Auth0.getInstance(\"{YOUR_CLIENT_ID}\", \"{YOUR_DOMAIN}\");\n```\n\u003c/details\u003e\n\n\u003cdetails\u003e\n  \u003csummary\u003eConfigure using Android Context\u003c/summary\u003e\n\nAlternatively, you can save your Application information in the `strings.xml` file using the following names:\n\n```xml\n\u003cresources\u003e\n    \u003cstring name=\"com_auth0_client_id\"\u003eYOUR_CLIENT_ID\u003c/string\u003e\n    \u003cstring name=\"com_auth0_domain\"\u003eYOUR_DOMAIN\u003c/string\u003e\n\u003c/resources\u003e\n```\n\nYou can then create a new Auth0 instance by passing an Android Context:\n\n```kotlin\nval account = Auth0.getInstance(context)\n```\n\u003c/details\u003e\n\n### Authentication with Universal Login\n\nFirst go to the [Auth0 Dashboard](https://manage.auth0.com/#/applications) and go to your application's settings. Make sure you have in **Allowed Callback URLs** a URL with the following format:\n\n```\nhttps://{YOUR_AUTH0_DOMAIN}/android/{YOUR_APP_PACKAGE_NAME}/callback\n```\n\n\u003e ⚠️ Make sure that the [application type](https://auth0.com/docs/configure/applications) of the Auth0 application is **Native**.\n\nReplace `{YOUR_APP_PACKAGE_NAME}` with your actual application's package name, available in your `app/build.gradle` file as the `applicationId` value.\n\nNext, define the Manifest Placeholders for the Auth0 Domain and Scheme which are going to be used internally by the library to register an **intent-filter**. Go to your application's `build.gradle` file and add the `manifestPlaceholders` line as shown below:\n\n```groovy\napply plugin: 'com.android.application'\n\nandroid {\n    compileSdkVersion 30\n    defaultConfig {\n        applicationId \"com.auth0.samples\"\n        minSdkVersion 21\n        targetSdkVersion 30\n        //...\n\n        //---\u003e Add the next line\n        manifestPlaceholders = [auth0Domain: \"@string/com_auth0_domain\", auth0Scheme: \"https\"]\n        //\u003c---\n    }\n    //...\n}\n```\n\nIt's a good practice to define reusable resources like `@string/com_auth0_domain`, but you can also hard-code the value.\n\n\u003e The scheme value can be either `https` or a custom one. Read [this section](#a-note-about-app-deep-linking) to learn more.\n\nDeclare the callback instance that will receive the authentication result and authenticate by showing the **Auth0 Universal Login**:\n\n```kotlin\nval callback = object : Callback\u003cCredentials, AuthenticationException\u003e {\n    override fun onFailure(exception: AuthenticationException) {\n        // Failure! Check the exception for details\n    }\n\n    override fun onSuccess(credentials: Credentials) {\n        // Success! Access token and ID token are presents\n    }\n}\n\nWebAuthProvider.login(account)\n    .start(this, callback)\n```\n\n\u003cdetails\u003e\n  \u003csummary\u003eUsing coroutines\u003c/summary\u003e\n\n```kotlin\ntry {\n    val credentials = WebAuthProvider.login(account)\n        .await(requireContext())\n    println(credentials)    \n} catch(e: AuthenticationException) {\n    e.printStacktrace()\n}\n```\n\u003c/details\u003e\n\n\u003cdetails\u003e\n  \u003csummary\u003eUsing Java\u003c/summary\u003e\n\n```java\nCallback\u003cCredentials, AuthenticationException\u003e callback = new Callback\u003cCredentials, AuthenticationException\u003e() {\n    @Override\n    public void onFailure(@NonNull AuthenticationException exception) {\n        //failed with an exception\n    }\n\n    @Override\n    public void onSuccess(@Nullable Credentials credentials) {\n        //succeeded!\n    }\n};\n\nWebAuthProvider.login(account)\n    .start(this, callback);\n```\n\u003c/details\u003e\n\nThe callback will get invoked when the user returns to your application. There are a few scenarios where this may fail:\n\n* When the device cannot open the URL because it doesn't have any compatible browser application installed. You can check this scenario with `error.isBrowserAppNotAvailable`.\n* When the user manually closed the browser (e.g. pressing the back key). You can check this scenario with `error.isAuthenticationCanceled`.\n* When there was a server error. Check the received exception for details.\n\n\u003e If the `redirect` URL is not found in the **Allowed Callback URLs** of your Auth0 Application, the server will not make the redirection and the browser will remain open.\n\n##### A note about App Deep Linking:\n\n\u003e Whenever possible, Auth0 recommends using [Android App Links](https://auth0.com/docs/applications/enable-android-app-links) as a secure way to link directly to content within your app. Custom URL schemes can be subject to [client impersonation attacks](https://datatracker.ietf.org/doc/html/rfc8252#section-8.6).\n\nIf you followed the configuration steps documented here, you may have noticed the default scheme used for the Callback URI is `https`. This works best for Android API 23 or newer if you're using [Android App Links](https://auth0.com/docs/applications/enable-android-app-links), but in previous Android versions this _may_ show the intent chooser dialog prompting the user to choose either your application or the browser. You can change this behaviour by using a custom unique scheme so that the OS opens directly the link with your app.\n\n1. Update the `auth0Scheme` Manifest Placeholder on the `app/build.gradle` file or update the intent-filter declaration in the `AndroidManifest.xml` to use the new scheme.\n2. Update the **Allowed Callback URLs** in your [Auth0 Dashboard](https://manage.auth0.com/#/applications) application's settings.\n3. Call `withScheme()` in the `WebAuthProvider` builder passing the custom scheme you want to use.\n\n```kotlin\nWebAuthProvider.login(account)\n    .withScheme(\"myapp\")\n    .start(this, callback)\n```\n\n\u003e Note that the schemes [can only have lowercase letters](https://developer.android.com/guide/topics/manifest/data-element).\n\n### Clearing the session\n\nTo log the user out and clear the SSO cookies that the Auth0 Server keeps attached to your browser app, you need to call the [logout endpoint](https://auth0.com/docs/api/authentication?#logout). This can be done in a similar fashion to how you authenticated before: using the `WebAuthProvider` class.\n\nMake sure to [revisit this section](#authentication-with-universal-login) to configure the Manifest Placeholders if you still cannot authenticate successfully. The values set there are used to generate the URL that the server will redirect the user back to after a successful log out.\n\nIn order for this redirection to happen, you must copy the **Allowed Callback URLs** value you added for authentication into the **Allowed Logout URLs** field in your [application settings](https://manage.auth0.com/#/applications). Both fields should have an URL with the following format:\n\n```\nhttps://{YOUR_AUTH0_DOMAIN}/android/{YOUR_APP_PACKAGE_NAME}/callback\n```\n\nRemember to replace `{YOUR_APP_PACKAGE_NAME}` with your actual application's package name, available in your `app/build.gradle` file as the `applicationId` value.\n\nInitialize the provider, this time calling the static method `logout`.\n\n```kotlin\n//Declare the callback that will receive the result\nval logoutCallback = object: Callback\u003cVoid?, AuthenticationException\u003e {\n    override fun onFailure(exception: AuthenticationException) {\n        // Failure! Check the exception for details\n    }\n\n    override fun onSuccess(result: Void?) {\n        // Success! The browser session was cleared\n    }\n}\n\n//Configure and launch the log out\nWebAuthProvider.logout(account)\n        .start(this, logoutCallback)\n```\n\n\u003cdetails\u003e\n  \u003csummary\u003eUsing coroutines\u003c/summary\u003e\n\n```kotlin\ntry {\n    WebAuthProvider.logout(account)\n        .await(requireContext())\n    println(\"Logged out\")\n} catch(e: AuthenticationException) {\n    e.printStacktrace()\n}\n```\n\u003c/details\u003e\n\n\u003cdetails\u003e\n  \u003csummary\u003eUsing Java\u003c/summary\u003e\n\n```java\n//Declare the callback that will receive the result\nCallback\u003cVoid, AuthenticationException\u003e logoutCallback = new Callback\u003cVoid, AuthenticationException\u003e() {\n    @Override\n    public void onFailure(@NonNull Auth0Exception exception) {\n        //failed with an exception\n    }\n\n    @Override\n    public void onSuccess(@Nullable Void payload) {\n        //succeeded!\n    }\n};\n\n//Configure and launch the log out\nWebAuthProvider.logout(account)\n    .start(MainActivity.this, logoutCallback);\n```\n\u003c/details\u003e\n\nThe callback will get invoked when the user returns to your application. There are a few scenarios where this may fail:\n\n* When the device cannot open the URL because it doesn't have any compatible browser application installed. You can check this scenario with `error.isBrowserAppNotAvailable`.\n* When the user manually closed the browser (e.g. pressing the back key). You can check this scenario with `error.isAuthenticationCanceled`.\n\nIf the `returnTo` URL is not found in the **Allowed Logout URLs** of your Auth0 Application, the server will not make the redirection and the browser will remain open.\n\n### Trusted Web Activity\n\nTrusted Web Activity is a feature provided by some browsers to provide a native look and feel.\n\n\u003cp align=\"center\"\u003e\n    \u003cimg width=\"500\" alt=\"Trusted Web Activity\" src=\"https://github.com/auth0/Auth0.Android/assets/15910425/0be50959-e7e9-4a41-a99c-4c4c377e1faa\"\u003e\n\u003c/p\u003e\n\nTo use this feature, there are some additional steps you must take:\n\n- We need the SHA256 fingerprints of the app’s signing certificate. To get this, you can run the following command on your APK:\n```shell\nkeytool -printcert -jarfile sample-debug.apk\n```\n- The fingerprint has to be updated in the [Auth0 Dashboard](https://manage.auth0.com/dashboard/eu/poovamraj/applications) under\nApplications \u003e *Specific Application* \u003e Settings \u003e Advanced Settings \u003e Device Settings \u003e Key Hashes\n- The app's package name has to be entered in the field above\n\nOnce the above prerequisites are met, you can call your login method as shown below to open your web authentication in Trusted Web Activity.\n\n```kotlin\nWebAuthProvider.login(account)\n    .withTrustedWebActivity()\n    .await(this)\n```\n\n## Credentials Manager\n\nThis library ships with two additional classes that help you manage the Credentials received during authentication.\n\n### Basic\n\nThe basic version supports asking for `Credentials` existence, storing them and getting them back. If the credentials have expired and a refresh_token was saved, they are automatically refreshed. The class is called `CredentialsManager`.\n\n#### Usage\n1. **Instantiate the manager:**\n   You'll need an `AuthenticationAPIClient` instance to renew the credentials when they expire and a `Storage` object. We provide a `SharedPreferencesStorage` class that makes use of `SharedPreferences` to create a file in the application's directory with **Context.MODE_PRIVATE** mode.\n\n```kotlin\nval authentication = AuthenticationAPIClient(account)\nval storage = SharedPreferencesStorage(this)\nval manager = CredentialsManager(authentication, storage)\n```\n\n\u003cdetails\u003e\n  \u003csummary\u003eUsing Java\u003c/summary\u003e\n\n```java\nAuthenticationAPIClient authentication = new AuthenticationAPIClient(account);\nStorage storage = new SharedPreferencesStorage(this);\nCredentialsManager manager = new CredentialsManager(authentication, storage);\n```\n\u003c/details\u003e\n\n2. **Save credentials:**\n   The credentials to save **must have** `expires_at` and at least an `access_token` or `id_token` value. If one of the values is missing when trying to set the credentials, the method will throw a `CredentialsManagerException`. If you want the manager to successfully renew the credentials when expired you must also request the `offline_access` scope when logging in in order to receive a `refresh_token` value along with the rest of the tokens. i.e. Logging in with a database connection and saving the credentials:\n\n```kotlin\nauthentication\n    .login(\"info@auth0.com\", \"a secret password\", \"my-database-connection\")\n    .setScope(\"openid email profile offline_access\")\n    .start(object : Callback\u003cCredentials, AuthenticationException\u003e {\n        override fun onFailure(exception: AuthenticationException) {\n            // Error\n        }\n\n        override fun onSuccess(credentials: Credentials) {\n            //Save the credentials\n            manager.saveCredentials(credentials)\n        }\n    })\n``` \n\n\u003cdetails\u003e\n  \u003csummary\u003eUsing coroutines\u003c/summary\u003e\n\n```kotlin\ntry {\n    val credentials = authentication\n        .login(\"info@auth0.com\", \"a secret password\", \"my-database-connection\")\n        .setScope(\"openid email profile offline_access\")\n        .await()\n    manager.saveCredentials(credentials)\n} catch (e: AuthenticationException) {\n    e.printStacktrace()\n}\n```\n\u003c/details\u003e\n\n\u003cdetails\u003e\n  \u003csummary\u003eUsing Java\u003c/summary\u003e\n\n```java\nauthentication\n    .login(\"info@auth0.com\", \"a secret password\", \"my-database-connection\")\n    .setScope(\"openid email profile offline_access\")\n    .start(new BaseCallback\u003cCredentials, AuthenticationException\u003e() {\n        @Override\n        public void onSuccess(Credentials payload) {\n            //Save the credentials\n            manager.saveCredentials(credentials);\n        }\n\n        @Override\n        public void onFailure(AuthenticationException error) {\n            //Error!\n        }\n    });\n```\n\u003c/details\u003e\n\n**Note:** This method has been made thread-safe after version 2.8.0.\n\n3. **Check credentials existence:**\n   There are cases were you just want to check if a user session is still valid (i.e. to know if you should present the login screen or the main screen). For convenience, we include a `hasValidCredentials` method that can let you know in advance if a non-expired token is available without making an additional network call. The same rules of the `getCredentials` method apply:\n\n```kotlin\nval authenticated = manager.hasValidCredentials()\n```\n\n\u003cdetails\u003e\n  \u003csummary\u003eUsing Java\u003c/summary\u003e\n\n```java\nboolean authenticated = manager.hasValidCredentials();\n```\n\u003c/details\u003e\n\n4. **Retrieve credentials:**\n   Existing credentials will be returned if they are still valid, otherwise the `refresh_token` will be used to attempt to renew them. If the `expires_at` or both the `access_token` and `id_token` values are missing, the method will throw a `CredentialsManagerException`. The same will happen if the credentials have expired and there's no `refresh_token` available.\n\n```kotlin\nmanager.getCredentials(object : Callback\u003cCredentials, CredentialsManagerException\u003e {\n    override fun onFailure(exception: CredentialsManagerException) {\n        // Error\n    }\n\n    override fun onSuccess(credentials: Credentials) {\n        // Use the credentials\n    }\n})\n``` \n\n\u003cdetails\u003e\n  \u003csummary\u003eUsing coroutines\u003c/summary\u003e\n\n```kotlin\ntry {\n    val credentials = manager.awaitCredentials()\n    println(credentials)\n} catch (e: CredentialsManagerException) {\n    e.printStacktrace()\n}\n```\n\u003c/details\u003e\n\n\u003cdetails\u003e\n  \u003csummary\u003eUsing Java\u003c/summary\u003e\n\n```java\nmanager.getCredentials(new BaseCallback\u003cCredentials, CredentialsManagerException\u003e() {\n    @Override\n    public void onSuccess(Credentials credentials){\n        //Use the Credentials\n    }\n\n    @Override\n    public void onFailure(CredentialsManagerException error){\n        //Error!\n    }\n});\n```\n\u003c/details\u003e\n\n**Note:** In the scenario where the stored credentials have expired and a `refresh_token` is available, the newly obtained tokens are automatically saved for you by the Credentials Manager. This method has been made thread-safe after version 2.8.0.\n\n5. **Clear credentials:**\n   When you want to log the user out:\n\n```kotlin\nmanager.clearCredentials()\n```\n\n## Feedback\n\n### Contributing\n\nWe appreciate feedback and contribution to this repo! Before you get started, please see the following:\n\n- [Auth0's general contribution guidelines](https://github.com/auth0/open-source-template/blob/master/GENERAL-CONTRIBUTING.md)\n- [Auth0's code of conduct guidelines](https://github.com/auth0/open-source-template/blob/master/CODE-OF-CONDUCT.md)\n\n### Raise an issue\nTo provide feedback or report a bug, [please raise an issue on our issue tracker](https://github.com/auth0/Auth0.Android/issues).\n\n### Vulnerability Reporting\nPlease do not report security vulnerabilities on the public Github issue tracker. The [Responsible Disclosure Program](https://auth0.com/whitehat) details the procedure for disclosing security issues.\n\n---\n\n\u003cp align=\"center\"\u003e\n  \u003cpicture\u003e\n    \u003csource media=\"(prefers-color-scheme: light)\" srcset=\"https://cdn.auth0.com/website/sdks/logos/auth0_light_mode.png\" width=\"150\"\u003e\n    \u003csource media=\"(prefers-color-scheme: dark)\" srcset=\"https://cdn.auth0.com/website/sdks/logos/auth0_dark_mode.png\" width=\"150\"\u003e\n    \u003cimg alt=\"Auth0 Logo\" src=\"https://cdn.auth0.com/website/sdks/logos/auth0_light_mode.png\" width=\"150\"\u003e\n  \u003c/picture\u003e\n\u003c/p\u003e\n\u003cp align=\"center\"\u003eAuth0 is an easy to implement, adaptable authentication and authorization platform. To learn more checkout \u003ca href=\"https://auth0.com/why-auth0\"\u003eWhy Auth0?\u003c/a\u003e\u003c/p\u003e\n\u003cp align=\"center\"\u003e\nThis project is licensed under the MIT license. See the \u003ca href=\"https://github.com/auth0/auth0.android/blob/main/LICENSE\"\u003e LICENSE\u003c/a\u003e file for more info.\u003c/p\u003e","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fauth0%2Fauth0.android","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fauth0%2Fauth0.android","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fauth0%2Fauth0.android/lists"}