aud
) in an OIDC login flow. To learn more, read Access Tokens.
When configuring custom claims on JWTs, you want to avoid collisions. To keep your custom claims from colliding with any reserved claims or claims from other resources, give them a collision-resistant name. Auth0 recommends using a namespaced format.
/userinfo
endpoint, cannot have private, non-namespaced custom claimsacr
act
active
amr
at_hash
ath
attest
aud
auth_time
authorization_details
azp
c_hash
client_id
cnf
cty
dest
entitlements
events
exp
groups
gty
htm
htu
iat
internalService
iss
jcard
jku
jti
jwe
jwk
kid
may_act
mky
nbf
nonce
object_id
org_id
org_name
orig
origid
permissions
roles
rph
s_hash
sid
sip_callid
sip_cseq_num
sip_date
sip_from_tag
sip_via_branch
sub
sub_jwk
toe
txn
typ
uuid
vot
vtm
x5t#S256
address
birthdate
email
email_verified
family_name
gender
given_name
locale
middle_name
name
nickname
phone_number
phone_number_verified
picture
preferred_username
profile
updated_at
website
zoneinfo
urn:auth0
cannot be used as a namespace identifier.http://
or https://
.
urn:auth0
is reserved and cannot be used as a namespace identifier.
http://www.example.com/favorite_color
employee_id
instead of e_id
.api
object allows you to use the method setCustomClaim
on access tokens or ID tokens.