Provides operations to manage custom token claims for the given authServerId
and claimId
okta.authorizationServers.read
Lists all custom token Claims defined for a specified custom authorization server
Success
Forbidden
Not Found
Too Many Requests
[- {
- "id": "{claimId}",
- "name": "sub",
- "status": "ACTIVE",
- "claimType": "RESOURCE",
- "valueType": "EXPRESSION",
- "value": "(appuser != null) ? appuser.userName : app.clientId",
- "conditions": {
- "scopes": [
- "profile"
]
}, - "system": true,
- "alwaysIncludeInToken": true,
- "apiResourceId": null,
- "_links": {
- "self": {
- "hints": {
- "allow": [
- "GET",
- "PUT",
- "DELETE"
]
}
}
}
}
]
okta.authorizationServers.manage
Creates a custom token Claim for a custom authorization server
alwaysIncludeInToken | boolean Specifies whether to include Claims in the token. The value is always | ||||||||||
claimType | string (OAuth2ClaimType) Specifies whether the Claim is for an access token ( | ||||||||||
object (OAuth2ClaimConditions) Specifies the scopes for the Claim | |||||||||||
group_filter_type | string (OAuth2ClaimGroupFilterType) Specifies the type of group filter if If If you have complex filters for Groups, you can create a Groups allowlist to put them all in a Claim.
| ||||||||||
name | string Name of the Claim | ||||||||||
status | string (LifecycleStatus) Enum: "ACTIVE" "INACTIVE" | ||||||||||
system | boolean When | ||||||||||
value | string Specifies the value of the Claim. This value must be a string literal if | ||||||||||
valueType | string (OAuth2ClaimValueType) Specifies whether the Claim is an Okta Expression Language (EL) expression ( |
Success
Bad Request
Forbidden
Not Found
Too Many Requests
[- {
- "alwaysIncludeInToken": true,
- "claimType": "IDENTITY",
- "conditions": {
- "scopes": [
- "profile"
]
}, - "group_filter_type": "CONTAINS",
- "name": "Support",
- "status": "ACTIVE",
- "system": false,
- "value": "Support",
- "valueType": "GROUPS"
}
]
[- {
- "id": "{claimId}",
- "name": "Support",
- "status": "ACTIVE",
- "claimType": "IDENTITY",
- "valueType": "GROUPS",
- "value": "Support",
- "conditions": {
- "scopes": [
- "profile"
]
}, - "system": false,
- "alwaysIncludeInToken": true,
- "apiResourceId": null,
- "group_filter_type": "CONTAINS",
- "_links": {
- "self": {
- "hints": {
- "allow": [
- "GET",
- "PUT",
- "DELETE"
]
}
}
}
}
]
okta.authorizationServers.read
Retrieves a custom token Claim by the specified claimId
Success
Forbidden
Not Found
Too Many Requests
[- {
- "id": "{claimId}",
- "name": "Support",
- "status": "ACTIVE",
- "claimType": "IDENTITY",
- "valueType": "GROUPS",
- "value": "Support",
- "conditions": {
- "scopes": [
- "profile"
]
}, - "system": false,
- "alwaysIncludeInToken": true,
- "apiResourceId": null,
- "group_filter_type": "CONTAINS",
- "_links": {
- "self": {
- "hints": {
- "allow": [
- "GET",
- "PUT",
- "DELETE"
]
}
}
}
}
]
okta.authorizationServers.manage
Replaces a custom token Claim specified by the claimId
alwaysIncludeInToken | boolean Specifies whether to include Claims in the token. The value is always | ||||||||||
claimType | string (OAuth2ClaimType) Specifies whether the Claim is for an access token ( | ||||||||||
object (OAuth2ClaimConditions) Specifies the scopes for the Claim | |||||||||||
group_filter_type | string (OAuth2ClaimGroupFilterType) Specifies the type of group filter if If If you have complex filters for Groups, you can create a Groups allowlist to put them all in a Claim.
| ||||||||||
name | string Name of the Claim | ||||||||||
status | string (LifecycleStatus) Enum: "ACTIVE" "INACTIVE" | ||||||||||
system | boolean When | ||||||||||
value | string Specifies the value of the Claim. This value must be a string literal if | ||||||||||
valueType | string (OAuth2ClaimValueType) Specifies whether the Claim is an Okta Expression Language (EL) expression ( |
Success
Bad Request
Forbidden
Not Found
Too Many Requests
[- {
- "alwaysIncludeInToken": true,
- "claimType": "IDENTITY",
- "conditions": {
- "scopes": [
- "profile"
]
}, - "group_filter_type": "CONTAINS",
- "name": "Knowledge_Base",
- "status": "ACTIVE",
- "system": false,
- "value": "Knowledge Base",
- "valueType": "GROUPS"
}
]
[- {
- "id": "{claimId}",
- "name": "Knowledge_Base",
- "status": "ACTIVE",
- "claimType": "IDENTITY",
- "valueType": "GROUPS",
- "value": "Knowledge Base",
- "conditions": {
- "scopes": [
- "profile"
]
}, - "system": false,
- "alwaysIncludeInToken": true,
- "apiResourceId": null,
- "group_filter_type": "CONTAINS",
- "_links": {
- "self": {
- "hints": {
- "allow": [
- "GET",
- "PUT",
- "DELETE"
]
}
}
}
}
]
okta.authorizationServers.manage
Deletes a custom token Claim specified by the claimId
No Content
Forbidden
Not Found
Too Many Requests
{- "errorCode": "E0000006",
- "errorSummary": "You do not have permission to perform the requested action",
- "errorLink": "E0000006",
- "errorId": "sampleNUSD_8fdkFd8fs8SDBK",
- "errorCauses": [ ]
}