Scopes and Claims

Here you can see all the scopes and claims we support.

Scopes are permissions that give access to certain claims or APIs, the user can give access to other applications using those scopes. They can be configured using the Vulos Identity dashboard.

Claims can be accessed using the OpenID Connect userinfo endpoint or by using User.info() in the JavaScript SDK.

circle-info

See UserInfo for more information.

User Info

GET https://identity.vulos.io/connect/userinfo

Use an access token to get claims appropriate to the scopes of the application that created the access token.

Headers

Name
Type
Description

Authorization*

String

Bearer authentication with the access token obtained using OpenID Connect

{ "sub": "<guid>", ... }

openid

This scope can be used to identify the user using the sub claim, which is a per-user unique identifier.

circle-exclamation
// assuming you have done the correct setup and have an UserInfo instance
const userId = userInfo.sub() // there is an alias called id() as well

email

This scope can be used to get the user's email and their email confirmation status.

circle-exclamation

profile

This scope can be used to get some personal information about the user.

circle-exclamation

profile:read

Provides access to the Profile API.

address

This scope can be used to get the user's address.

public

This scope can be used to get the user's trust level and KYC verification status.

circle-exclamation

private

This scope can be used to get the user's digital ID and national ID.

wallet

This scope can be used to get the user's Ethereum and Velas wallet addresses.

organization

The organization scope group is divided in 3 scopes:

  • organization:read which provides the claims organization:name and organization:id for all the organizations that the user has a membership for;

  • organization:roles which provides the organization:role claim for the roles that the user has in the application's associated organization;

  • organization:manage which provides access to the Organization API;

organization:read

organization:roles

circle-exclamation

organization:manage

This scope doesn't provide any claims, it just provides access to the following API:

Organization APIchevron-right

kyc

The kyc scope group is divided in 2 scopes:

  • kyc:read which gives access to the KYC status and list APIs;

  • kyc:write which gives access to the KYC create and upload APIs;

KYC APIchevron-right

event

The event scope group is divided in 3 scopes:

  • event:create which lets the application create event sessions;

  • event:read which lets the application read/subscribe to event sessions;

  • event:write which lets the application push events to a session;

Last updated