Provides operations to manage custom token claims for the given authServerId and claimId
Lists all custom token Claims defined for a specified custom authorization server
Success
Forbidden
Not Found
Too Many Requests
[- {- "id": "{claimId}",
- "name": "sub",
- "status": "ACTIVE",
- "claimType": "RESOURCE",
- "valueType": "EXPRESSION",
- "value": "(appuser != null) ? appuser.userName : app.clientId",
- "conditions": {- "scopes": [- "profile"
 ]
 },
- "system": true,
- "alwaysIncludeInToken": true,
- "apiResourceId": null,
- "_links": {- "self": {
- "hints": {- "allow": [- "GET",
- "PUT",
- "DELETE"
 ]
 }
 }
 }
 }
]Creates a custom token Claim for a custom authorization server
| alwaysIncludeInToken | boolean Specifies whether to include Claims in the token. The value is always  | ||||||||||
| claimType | string (OAuth2ClaimType)  Specifies whether the Claim is for an access token ( | ||||||||||
| object (OAuth2ClaimConditions)  Specifies the scopes for the Claim | |||||||||||
| group_filter_type | string (OAuth2ClaimGroupFilterType)  Specifies the type of group filter if  If  If you have complex filters for Groups, you can create a Groups allowlist to put them all in a Claim. 
 | ||||||||||
| name | string Name of the Claim | ||||||||||
| status | string (LifecycleStatus)   Enum: "ACTIVE" "INACTIVE"   | ||||||||||
| system | boolean When  | ||||||||||
| value | string Specifies the value of the Claim. This value must be a string literal if  | ||||||||||
| valueType | string (OAuth2ClaimValueType)  Specifies whether the Claim is an Okta Expression Language (EL) expression ( | ||||||||||
Success
Bad Request
Forbidden
Not Found
Too Many Requests
[- {- "alwaysIncludeInToken": true,
- "claimType": "IDENTITY",
- "conditions": {- "scopes": [- "profile"
 ]
 },
- "group_filter_type": "CONTAINS",
- "name": "Support",
- "status": "ACTIVE",
- "system": false,
- "value": "Support",
- "valueType": "GROUPS"
 }
][- {- "id": "{claimId}",
- "name": "Support",
- "status": "ACTIVE",
- "claimType": "IDENTITY",
- "valueType": "GROUPS",
- "value": "Support",
- "conditions": {- "scopes": [- "profile"
 ]
 },
- "system": false,
- "alwaysIncludeInToken": true,
- "apiResourceId": null,
- "group_filter_type": "CONTAINS",
- "_links": {- "self": {
- "hints": {- "allow": [- "GET",
- "PUT",
- "DELETE"
 ]
 }
 }
 }
 }
]Retrieves a custom token Claim by the specified claimId
Success
Forbidden
Not Found
Too Many Requests
[- {- "id": "{claimId}",
- "name": "Support",
- "status": "ACTIVE",
- "claimType": "IDENTITY",
- "valueType": "GROUPS",
- "value": "Support",
- "conditions": {- "scopes": [- "profile"
 ]
 },
- "system": false,
- "alwaysIncludeInToken": true,
- "apiResourceId": null,
- "group_filter_type": "CONTAINS",
- "_links": {- "self": {
- "hints": {- "allow": [- "GET",
- "PUT",
- "DELETE"
 ]
 }
 }
 }
 }
]Replaces a custom token Claim specified by the claimId
| alwaysIncludeInToken | boolean Specifies whether to include Claims in the token. The value is always  | ||||||||||
| claimType | string (OAuth2ClaimType)  Specifies whether the Claim is for an access token ( | ||||||||||
| object (OAuth2ClaimConditions)  Specifies the scopes for the Claim | |||||||||||
| group_filter_type | string (OAuth2ClaimGroupFilterType)  Specifies the type of group filter if  If  If you have complex filters for Groups, you can create a Groups allowlist to put them all in a Claim. 
 | ||||||||||
| name | string Name of the Claim | ||||||||||
| status | string (LifecycleStatus)   Enum: "ACTIVE" "INACTIVE"   | ||||||||||
| system | boolean When  | ||||||||||
| value | string Specifies the value of the Claim. This value must be a string literal if  | ||||||||||
| valueType | string (OAuth2ClaimValueType)  Specifies whether the Claim is an Okta Expression Language (EL) expression ( | ||||||||||
Success
Bad Request
Forbidden
Not Found
Too Many Requests
[- {- "alwaysIncludeInToken": true,
- "claimType": "IDENTITY",
- "conditions": {- "scopes": [- "profile"
 ]
 },
- "group_filter_type": "CONTAINS",
- "name": "Knowledge_Base",
- "status": "ACTIVE",
- "system": false,
- "value": "Knowledge Base",
- "valueType": "GROUPS"
 }
][- {- "id": "{claimId}",
- "name": "Knowledge_Base",
- "status": "ACTIVE",
- "claimType": "IDENTITY",
- "valueType": "GROUPS",
- "value": "Knowledge Base",
- "conditions": {- "scopes": [- "profile"
 ]
 },
- "system": false,
- "alwaysIncludeInToken": true,
- "apiResourceId": null,
- "group_filter_type": "CONTAINS",
- "_links": {- "self": {
- "hints": {- "allow": [- "GET",
- "PUT",
- "DELETE"
 ]
 }
 }
 }
 }
]Deletes a custom token Claim specified by the claimId
No Content
Forbidden
Not Found
Too Many Requests
{- "errorCode": "E0000006",
- "errorSummary": "You do not have permission to perform the requested action",
- "errorLink": "E0000006",
- "errorId": "sampleNUSD_8fdkFd8fs8SDBK",
- "errorCauses": [ ]
}