OpenIDC flow - application claims

Hi All,

Does anybody know how it’s possible to get application claims, specified on App Sign-On page, using .net core middleware sdk? It seems like it only pulls standard openid scoped attributes, no matter what configuration parameters I provide it with.

Does default Authorization server support groups scope, which is described as OOTB functionality?

Thank you

Hi @phi1ipp

If by default authorization server you are referring to the custom authorization server (eg. https://org.okta.com/oauth2/default), then it does not support by default. The scope and claim would need to be redeclared as per the steps mentioned here.

1 Like

Hi @dragos,

Yeah, I kinda figured, that I can explicitly specify claims and add them to “my
default” auth server (though you say it’s not the “default” one :slight_smile: ) and put them into whatever scope I want.

But can you explain then, what is that scenario, when those claims, which I refer to in my screenshot, will be available without recreating them per the document?

Thank you in advance!

Hi @phi1ipp

This claim is available when calling the Okta authorization server (endpoints are available under https://org.okta.com/.well-known/openid-configuration).

You can find out more details about Okta authorization server and custom authorization servers here.

Thank you @dragos,

That’s a useful link!