Claims
Claims are processed first in the authentication method and then the application registration, where it is possible to decide, which claims are passed to the next step and to do claim transforms and claim tasks.
All claim comparisons are case-sensitive.
The claims process starts in the authentication method when a user authenticates. There it is possible to do claim transforms and claim tasks and configure which claims have to be carried forward to the next step. Then the claims process continues in the application registration where it is also possible do claim transforms and configure which claims have to be issued to the application / API.
In a Client Credentials Grant scenario, the claims process is only done in the application registration. The same goes for the claim transforms and the configuration of which claims have to be issued to the application / API.
Authentication method
In both an OpenID Connect and SAML 2.0 authentication method claims are carried forward by adding them to the Forward claims list. All claims are carried forward if a wildcard * is added to the Forward claims list.
An authentication method issues two claims which can be read in the application registration and used in claim transforms and claim tasks. The claims always apply to the last authentication method.
The authentication method issued claims (default forward):
auth_methodcontain the authentication method name, the name is unique in a environment.auth_method_typecontain the authentication method type:login,oidc,oauth2,saml2orenv_link.
A sub claim and an access token received from an external Identity Provider is nested with a pipe symbol (|) after the up_party name.
Examples:
- An external
subwith the valueafeda2a3-c08b-4bbb-ab77-35138dd2ef2dgets the nested valuethe-auth-method|afeda2a3-c08b-4bbb-ab77-35138dd2ef2d - An external access token with the value
eyJhG.cRwczov...nNjb3B.lIjoiis added in theaccess_tokenclaim with the nested valuethe-auth-method|eyJhG.cRwczov...nNjb3B.lIjoi
Application registration
In both an OpenID Connect, OAuth 2.0 and SAML 2.0 application registration claims are issued to the application / API by adding them to the Issue claims list. All claims are issued to the application / API if a wildcard * is added to the Issue claims list.
An OpenID Connect application registration can differentiate if a claim is only issued in the access token or also in the ID token.
An OpenID Connect and OAuth 2.0 application registration can carry claims forward by a scope as well. This is done by adding the claim or claims to a scope's Voluntary claims list. And the claims are then issued if the client application request for the scope.
An OpenID Connect application registration can also in the voluntary scope claims differentiate if a claim is only issued in the access token or also in the ID token.