@akhtar I have the same issue, could you provide some more information about what scopes you needed to set and how you configure the custom connector to specify the audience that needs to be requested when the connection is created with auth0?
I have an auth0 application that looks like this:

and this:

when I (successfully) log in to the application in the normal interactive way (not from Power Automate) then the login url is:
https://SNIPPED-dev.eu.auth0.com/authorize?redirect_uri=http%3A%2F%2Flocalhost%3A11113&client_id=7EDovlvoLLpK5FiyZ0gNXfQJ34Da0Nkq&audience=https%3A%2F%2Fdev.api.com&scope=openid%20profile%20email%20offline_access&response_type=code&response_mode=query&state=UDZPbkwxTExqcGZnU044czNaZDVkRVdsU3kuN29WSTNFMmhCT2F3YX5wTA%3D%3D&nonce=aWpHNUlfVDV%2BdjE3c2lyOWVuZFU4aGxjUDFSMTU3Tzh6ZXJlVEJhdmVGWg%3D%3D&code_challenge=FMzxLYlWPLTguMx4Coa0IPPeQGLBP2YJKobUE_hAi7w&code_challenge_method=S256&auth0Client=eyJuYW1lIjoiQGF1dGgwL2F1dGgwLWFuZ3VsYXIiLCJ2ZXJzaW9uIjoiMS4yLjAifQ%3D%3D
You can see that an audience of https://dev.api.com is being specified. When I use decode the JWT that is sent through to my API in a normal login scenario it looks like this:
{
"http://p3.peopleplus.truenorthit.co.uk/nickname": "aradice",
"http://p3.peopleplus.truenorthit.co.uk/name": "aradice@test.com",
"http://p3.peopleplus.truenorthit.co.uk/email": "aradice@test.com",
"iss": "https://SNIPPED-dev.eu.auth0.com/",
"sub": "auth0|5fc626d3aa67b2007595f861",
"aud": [
"https://dev.api.com",
"https://SNIPPED-dev.eu.auth0.com/userinfo"
],
"iat": 1606905089,
"exp": 1606991489,
"azp": "7EDovlvoLLpK5FiyZ0gNXfQJ34Da0Nkq",
"scope": "openid profile email",
"permissions": [
"actions:process-own",
"actions:view-own",
"notifications:view-own"
]
}
You can see that the "aud" array contains the audience I've requested. The JWT that contins all that info is pretty long, about 1300 characters including the signature. But when I try to use Power Automate to create a connection the same API I notice a couple of things:
The auth0 Url that Power Automate uses to set up the connection is quite different from the Url that I hit when logging in to the application in the normal way:
https://SNIPPED-dev.eu.auth0.com/login?state=g6Fo2SBhVnhYUHlJZ29NVW5LR0lKY1ltRURFNTNMcXc0SzF5Z6N0aWTZIDRIUmFxMnR1WVI4bndDZ0o2dENHUVJjeU9JdWhIYzU5o2NpZNkgT0ZVTXBVVXBXSTlHQkQ3SnhpQXBaZmVhTXBsUXJWSkQ&client=7EDovlvoLLpK5FiyZ0gNXfQJ34Da0Nkq&protocol=oauth2&response_type=code&redirect_uri=https%3A%2F%2Fglobal.consent.azure-apim.net%2Fredirect&scope=openid%20profile%20email%20offline_access​
When I test my connector the Bearer token that Power Automate sends is tiny, only 32 characters long, and it isn't a JWT, My application rejects this with a 401.
I'm also having the same problem as you in that it is extremely difficult to troubleshoot this as the error that the Power Automate reports is with calling one of its own internal endpoints, the real error being hidden away somewhere in the internals:

Can you give me any pointers?