Default Claims Supported

This is the default claims supported by Authway, but custom support can be added for more/other claims in a customer instance. The scope that the claims belong to is also the default, but could differ for a specific customer.

Scope Claim Description
openid sub A unique value identifying the user.
openid tid A unique value identifying the tenant the user belongs to.
profile family_name The surname of the user. For example “Doe”.
profile given_name The given name of the user. For example “Joe”.
profile name The full name of the user (given_name + ’ ’ + family_name). For example “Joe Doe”.
profile preferred_username The user name used during sign-in, most commonly the e-mail address.
profile picture A URL with a user picture taken from Gravatar or the initials if the user does not have a Gravatar picture.
email email The email address of the user. Could exists twice if the user has another e-mail registered on the person.
email email_verified True if the email address have been verified and it is always the same e-mail address used as user name that are confirmed (or not).
phone phone_number The phone number of the user.
phone phone_number_verified True if the phone number have been verified; otherwise False.
org orgid The unique identifier for the organisation the user belongs to. Will be the same as tid for users belonging to the mother organisation, but could be different for users belonging to a subsidiary.
org orgin The organisation number identifying the organisation, if the value exists.
org company_name The name of the organisation.
roles role The name of the group the user belongs to. Zero, one or more claims of this type could exists depending on the number of groups the user belongs to.
perms perm The unique identifier of a permission that the user have. Zero, one or more claims of this type could exists depending on the number of permissions the user got.

Protocol claims

Claim Description
amr The authentication used when the user signed in. The value would be pwd for password or external for an external identity provider (idp). More than one amr claim can exists. For example if multi-factor authentication is used there will be an amr claim with the mfa value.
idp The identity provider used when amr is external or local if the user used a password to sign-in.
auth_time The time the user authenticated. Could be used to evaluate if a re-authentication is required.

There are more protocol claims, but those are the most commonly used claims by developers themselves.

Special claims

Impersonated users

If a user is impersonated there will be an act claim with a serialized json structure with standard claims from the original user performing the impersonation. For example:

"act": {
   "oid":"d5542f98-8a6f-6d2a-cda0-39fc52ae2b58",
   "sub":"295A0000-E969-E6E6-3826-08DB0DD1E036",
   "tid":"a27446b6-795e-4ccc-1da6-39fc52ae2b37"
}

If impersonation is used there will also be a second amr claim with the value imp (for impersonate).

Linked accounts

If linked account are used the sub claim will have the same value for all linked accounts (that is the definition of linked accounts) which means that it is not unique over all tenants anymore. In that case a oid claim (object id) is also issued with a true unique identifier over all tenants.

For linked accounts the a may_login claim is also issued for org scope, which contains a serialized JSON array with information about other organisations that the user could switch to. For example:

"may_login": {
   [{
      "oid":"d5542f98-8a6f-6d2a-cda0-39fc52ae2b58", 
      "tid":"ffffffff-ffff-ffff-ffff-ffffffffffff",
      "companyname": "Privatpersoner"
   }]
}