/userinfo
endpoint. To learn more about the types of claims, read JSON Web Token Claims.
/userinfo
endpoint of Auth0’s Authentication API.
acr
act
active
amr
at_hash
ath
attest
aud
auth_time
authorization_details
azp
c_hash
client_id
cnf
cty
dest
entitlements
events
exp
groups
gty
htm
htu
iat
internalService
iss
jcard
jku
jti
jwe
jwk
kid
may_act
mky
nbf
nonce
object_id
org_id
org_name
orig
origid
permissions
roles
rph
s_hash
sid
sip_callid
sip_cseq_num
sip_date
sip_from_tag
sip_via_branch
sub
sub_jwk
toe
txn
typ
uuid
vot
vtm
x5t#S256
https://YOUR_TENANT.auth0.com/api
or https://YOUR_TENANT.auth0app.com/api
https://YOUR_TENANT.auth0.com/api/v2
or https://YOUR_TENANT.auth0app.com/api/v2
https://YOUR_TENANT.auth0.com/mfa
or https://YOUR_TENANT.auth0app.com/mfa
/userinfo
audience. Private, non-namespaced custom claims are allowed on the following audience:
https://YOUR_TENANT.auth0.com/userinfo
https://YOUR_TENANT.auth0app.com/userinfo
/userinfo
response. This behavior disappears after the migration and such custom claims are completely ignored.email
claim to access tokens, the flow must be triggered with a scope
that contains email
.address
birthdate
email
email_verified
family_name
gender
given_name
locale
middle_name
name
nickname
phone_number
phone_number_verified
picture
preferred_username
profile
updated_at
website
zoneinfo
app_metadata
or user_metadata
pre-migration claims also merge contents when the claim is set on the context.idToken
object and the names conflict. To learn more about the object properties, read User Object Properties In Rules.
Using custom claims, however, Auth0 gives precedence to the claim that was set on the context.idToken object
.
This change impacts Auth0 Rules that set app_metadata
and user_metadata
via context.id_token
(assigning objects to them) and, at the same time, uses these fields in attribute mapping for add-on or Protocol (WS-Fed).
Example 1: Auth0 ignores attribute mapping when context.idToken.app_metadata
is set with an empty object.
app_metadata
in context.id_token
takes precedence.
type: depnote AND description: *Custom*claims*
.app_metadata
or user_metadata
claims on the context.idToken
object using SAML2 add-on or Web Service Federation Protocol (Ws-Fed) with Auth0 Rules along with attribute mapping, you will need to update your configuration to adjust for how Auth0 evaluates conflicting claim names between these objects. There are several possible fixes:
context.id_token
:
app_metadata
or user_metadata
claims on the context.idToken
object. Replace these claims with name-spaced claims when possible:
app_metadata
or user_metadata
when the protocol is samlp
or wsfed
.