-
Notifications
You must be signed in to change notification settings - Fork 734
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Selective JWT Access Token Claims Handling #20880
Comments
This was referenced Aug 12, 2024
Merged
This was referenced Nov 11, 2024
Closed
Merged
Merged
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Is your suggestion related to an experience ? Please describe.
In Identity Server/Asgardeo, The attributes configured in the user attributes section are automatically added to the JWT access token when those claims are requested. This automatic inclusion can lead to unnecessary claims within the JWT access token. This may result in the inclusion of personally identifiable information (PII) without any practical necessity, leading to the overexposure of sensitive user information. Also, these unwanted claims in JWT access token can increase the token's size, thereby impacting performance.
There is no existing mechanism to selectively include or exclude these user attributes to JWT access tokens.
To address this issue, we need to introduce a way to handle JWT access token claims selectively. This would allow admins to control which claims should be included in the JWT access token. Such a feature ensures that sensitive information is handled securely and only necessary data is transmitted through JWT access tokens.
Describe the improvement
Introduce selective JWT access token claims handling. This offer admins to control which claims should be included in the JWT access tokens.
Additional context
The text was updated successfully, but these errors were encountered: