Scopes and Claims
Here you can see all the scopes and claims we support.
Scopes are permissions that give access to certain claims or APIs, the user can give access to other applications using those scopes. They can be configured using the Vulos Identity dashboard.
Claims can be accessed using the OpenID Connect userinfo
endpoint or by using User.info()
in the JavaScript SDK.
See UserInfo
for more information.
User Info
GET
https://identity.vulos.io/connect/userinfo
Use an access token to get claims appropriate to the scopes of the application that created the access token.
Headers
Name | Type | Description |
---|---|---|
Authorization* | String | Bearer authentication with the access token obtained using OpenID Connect |
openid
openid
This scope can be used to identify the user using the sub
claim, which is a per-user unique identifier.
This is a required scope, meaning that if the user decides do use an app, they cannot restrict access to this scope if the app requires it.
email
email
This scope can be used to get the user's email and their email confirmation status.
This is a required scope, meaning that if the user decides do use an app, they cannot restrict access to this scope if the app requires it.
profile
profile
This scope can be used to get some personal information about the user.
This is a required scope, meaning that if the user decides do use an app, they cannot restrict access to this scope if the app requires it.
profile:read
profile:read
Provides access to the Profile API.
address
address
This scope can be used to get the user's address.
public
public
This scope can be used to get the user's trust level and KYC verification status.
This is a required scope, meaning that if the user decides do use an app, they cannot restrict access to this scope if the app requires it.
private
private
This scope can be used to get the user's digital ID and national ID.
wallet
wallet
This scope can be used to get the user's Ethereum and Velas wallet addresses.
organization
organization
The organization scope group is divided in 3 scopes:
organization:read
which provides the claimsorganization:name
andorganization:id
for all the organizations that the user has a membership for;organization:roles
which provides theorganization:role
claim for the roles that the user has in the application's associated organization;organization:manage
which provides access to the Organization API;
organization:read
organization:read
organization:roles
organization:roles
This is a required scope, meaning that if the user decides do use an app, they cannot restrict access to this scope if the app requires it.
organization:manage
organization:manage
This scope doesn't provide any claims, it just provides access to the following API:
Organization APIkyc
kyc
The kyc
scope group is divided in 2 scopes:
kyc:read
which gives access to the KYC status and list APIs;kyc:write
which gives access to the KYC create and upload APIs;
event
event
The event scope group is divided in 3 scopes:
event:create
which lets the application create event sessions;event:read
which lets the application read/subscribe to event sessions;event:write
which lets the application push events to a session;
Last updated