- About
- Core technologies
- Requirements
- Getting started
- Dashboard
- Configuration Overview
- General
- License
- Resource Configuration
- Security & Flow Setup
- Certificates
- Identity
- Rate limiting
- Cors
- LoginProvider
- Advanced configuration
- Theme builder
- Email template builder
- Health checks
- What's New
- Migration guides
- Changelog
OpenIddict Resource Configuration
Configuration of Scopes, Claims and Audiences for the OpenID Connect server
Scopes
Scopes define the permissions and information that a client application can request during the authentication process. They represent the level of access granted to OAuth2/OpenID Connect clients.
Supported Standard Scopes:
openid - Unique user identifierprofile - User profile informationemail - User email addressaddress - User physical addressphone - Phone numberroles - User assigned rolesoffline_access - Access for refresh tokensNote: The openid scope is mandatory for OpenID Connect requests.
The offline_access scope is required if you want to use refresh tokens.
Claims
Claims are statements about an entity (typically the user) and represent the specific information that gets included in ID tokens and access tokens. Each claim has a name and a value.
Main Configurable Claims:
What to Configure:
- • Select only the claims that your application actually uses
- • Consider privacy: don't expose unnecessary sensitive information
- • Claims are automatically mapped from user profile when available
- • Some claims like
subandissare handled automatically by the system
Audiences
Audiences identify the intended recipients for access tokens. They specify which resources or APIs are authorized to receive and validate tokens issued by the server.
Typical Audience Examples:
GraphQL.Read, GraphQL.Wrtite -
Specific GraphQL endpoints that will consume the tokens
Configuration Guidelines:
- • Each audience should represent a distinct API or resource server
- • Use meaningful names that clearly identify the target service
- • Audiences are included in the
audclaim of access tokens - • Resource servers should validate that they are listed as an audience in received tokens
- • Consider using URLs or URNs for globally unique audience identifiers
Security Note: Properly configured audiences help prevent token misuse by ensuring tokens are only accepted by their intended recipients.
Quick Configuration Summary
Scopes
Define what information clients can request
Required: openid
Common: profile, email, roles
Claims
Specify user attributes to include in tokens
Select based on application needs
Consider privacy implications
Audiences
Identify which APIs can accept tokens
One per API/service
Use descriptive identifiers