Claims
Claims are processed first in the authentication method and then the application registration, where it is possible to decide, which claims are passed to the next step and to do claim transforms and claim tasks.
All claim comparisons are case-sensitive.
The claims process starts in the authentication method when a user authenticates. There it is possible to do claim transforms and claim tasks and configure which claims have to be carried forward to the next step. Then the claims process continues in the application registration where it is also possible do claim transforms and configure which claims have to be issued to the application / API.
In a Client Credentials Grant scenario, the claims process is only done in the application registration. The same goes for the claim transforms and the configuration of which claims have to be issued to the application / API.
Authentication method
In both an OpenID Connect and SAML 2.0 authentication method claims are carried forward by adding them to the Forward claims
list. All claims are carried forward if a wildcard *
is added to the Forward claims
list.
An authentication method issues two claims which can be read in the application registration and used in claim transforms and claim tasks. The claims always apply to the last authentication method.
The authentication method issued claims (default forward):
auth_method
contain the authentication method name, the name is unique in a environment.auth_method_type
contain the authentication method type:login
,oidc
,oauth2
,saml2
orenv_link
.
A sub
claim and an access token received from an external Identity Provider is nested with a pipe symbol (|) after the up_party name.
Examples:
- An external
sub
with the valueafeda2a3-c08b-4bbb-ab77-35138dd2ef2d
gets the nested valuethe-auth-method|afeda2a3-c08b-4bbb-ab77-35138dd2ef2d
- An external access token with the value
eyJhG.cRwczov...nNjb3B.lIjoi
is added in theaccess_token
claim with the nested valuethe-auth-method|eyJhG.cRwczov...nNjb3B.lIjoi
Application registration
In both an OpenID Connect, OAuth 2.0 and SAML 2.0 application registration claims are issued to the application / API by adding them to the Issue claims
list. All claims are issued to the application / API if a wildcard *
is added to the Issue claims
list.
An OpenID Connect application registration can differentiate if a claim is only issued in the access token or also in the ID token.
An OpenID Connect and OAuth 2.0 application registration can carry claims forward by a scope as well. This is done by adding the claim or claims to a scope's Voluntary claims
list. And the claims are then issued if the client application request for the scope.
An OpenID Connect application registration can also in the voluntary scope claims differentiate if a claim is only issued in the access token or also in the ID token.