GenAuth DocsDocuments
Concepts
User Guide
Development Integration
Metadata
Development Integration
Multi-tenant (beta)
Console Documentation
Multi-tenant Console
Tenant Console
Saas Application Demo
Concepts
User Guide
Development Integration
Metadata
Development Integration
Multi-tenant (beta)
Console Documentation
Multi-tenant Console
Tenant Console
Saas Application Demo
Old version
User Guide
  • Quick Start

  • Authentication

  • Access Control

  • Authorization

  • Adaptive MFA

  • User Account Management

  • User Directory Management

  • Applications

    • Self-built Applications

      • Create Self-built Application
      • Quick Start
      • Application Configuration
      • Protocol Configuration

        • Configure OIDC Protocol
        • Custom OIDC Scope
        • Configure OAuth Protocol
        • Configure SAML Protocol
        • Configure CAS Protocol
      • Login Control
      • Access Authorization
      • Branding
      • Security Management
    • Single Sign-On SSO

  • Become a Federation Authentication Identity Provider

  • Connect External Identity Providers (IdP)

  • WeChat Ecosystem Full Scenario Capabilities

  • Migrate Users to GenAuth

  • Security Settings

  • Branding

  • Automation

  • Audit Logs

  • Setting

  • FAQ

  1. User Guide
  2. /
  3. Applications
  4. /
  5. Self-built Applications
  6. /
  7. Protocol Configuration
  8. /
  9. Custom OIDC Scope

¶ Customize OIDC Scope

¶ Usage scenarios

Customize the user information returned by the ID Token by customizing the Scope and the Claims in it.

¶ OIDC Scope Function Configuration

After creating a self-built application, you can find the "OIDC" function area under the "Protocol Configuration" function area and find the "OIDC Scope Configuration".

Untitled

¶ Claim Configuration

¶ Default Claim

Claim NameMapped GenAuth User Fields
subuserId
namename
addressaddress
usernameusername
emailemail
email_verifiedemailVerified
phone_numberphone
phone_number_verifiedphoneVerified
birthdatebirthdate
family_namefamilyName
gendergender
given_namegivenName
localelocale
middle_namemiddleName
namename
nicknamenickname
picturepicture
preferred_usernamepreferredUsername
profileprofile
updated_atupdatedAt
websitewebsite
zoneinfozoneinfo
external_idexternalId
userpool_iduserpoolId
formattedformatted
street_addressstreetAddress
postal_codepostalCode
countrycountry

¶ Custom Claim

If the above default Claim still does not meet the user fields you expect to be returned, you can create a custom Claim and customize which GenAuth user field (basic field or extended field) your Claim maps to.

Step 1: Click "Add a Mapping"

Untitled

Step 2: Edit the name of your custom Claim

Untitled

Step 3: Configure the Authing user field mapped by the custom Claim

Untitled

¶ Scope Configuration

¶ Default Scope

Scope nameContained claimsDescription
offline_access/If this parameter exists, the token interface will return the refresh_token field
openidsubUsed to store user ID
usernameusernameUser name
addressaddressUser address
emailemail, email_verifiedUser email and verification status
phonephone_number, phone_number_verifiedUser phone number and verification status
profilebirthday, family_name, gender, given_name, locale, middle_name, name, nickname, picture, preferred_username, profile, updated_at, website, zoneinfoUser details
rolesrolesUser role list corresponding to role information
external_idexternalIdUser ID in the original system
extended_fieldsextended_fieldsUser's extended field information, the content is an object, the key is the extended field name, the value is the extended field value

¶ Custom Scope

If the default scope above still does not meet the user fields you expect to be returned, you can create a custom scope and customize which claims will be included in your scope.

Step 1: Click "New Custom Scope"

Untitled

Step 2: Modify the name of your custom scope

Untitled

Step 3: Configure the claims included in the custom scope

Untitled

¶ Use custom scope & claim

  • Use the hosted login page: GenAuth will return all preset scopes and your custom scope by default.
  • Use SDK to call directly: You can freely choose to call all the scopes you have configured and the claims they contain.
Previous article: Configure OIDC Protocol Next article: Configure OAuth Protocol
  • Usage scenarios
  • OIDC Scope Function Configuration

User identity management

Integrated third-party login
Customized authentication process

Enterprise internal management

Single sign-on
Multi-factor authentication
Permission management

Developer

Development Documentation
GitHub (opens new window)

Company

official@genauth.ai
16th Floor, Building B, Beichen Century Center, Chaoyang District, Beijing (Total)
Room 406, 4th Floor, Block B, No. 200, Tianfu Fifth Street, High-tech Zone, Chengdu (Branch)

© Beijing Steamory Technology Co., Ltd.