Skip to content

OIDC ID Token

This page explains how to use the OIDC ID Token identifier to match any claim in an OIDC ID token from a standards-compliant identity provider.

Understanding the OIDC ID Token identifier

Section titled “Understanding the OIDC ID Token identifier”

Unlike the dedicated Audience, Issuer, and Subject identifiers, the OIDC ID Token identifier lets you match on any claim in the token. You specify both a Claim Name (the JWT claim key, such as email) and a Claim Value (the expected string the claim must equal). Aembit evaluates the token, locates the claim by name, and checks whether its value matches.

Use this identifier to restrict access based on custom or non-standard token attributes. Examples include a user’s email address, a custom group membership field, or an organizational attribute your identity provider adds to tokens.

Use this identifier when your Client Workload authenticates using an OIDC ID token from a standards-compliant identity provider. The Access Policy must include an OIDC ID Token Trust Provider configured to validate tokens from the same identity provider.

Supported environments include:

  • CI/CD pipelines (GitLab CI/CD, GitHub Actions, Terraform Cloud)
  • Workloads using the Aembit MCP Identity Gateway
  • Any workload that presents a standards-compliant OIDC token to the Aembit Edge Component

Create a Client Workload with an OIDC ID Token identifier

Section titled “Create a Client Workload with an OIDC ID Token identifier”
  1. Log into your Aembit Tenant.

  2. In the sidebar, click Client Workloads.

  3. Click + New to open the Client Workload editor panel.

  4. Enter the Name and optional Description for the Client Workload.

  5. Under Client Identification, select OIDC ID Token.

    For Claim Name, enter the JWT claim you want to match on. The field offers Subject, Issuer, and Audience as common suggestions, but accepts any valid claim name.

    For Claim Value, enter the expected string value of that claim.

    For example, to match on a user’s email address:

    • Claim Name: email
    • Claim Value: user@example.com
  6. Click Save.

    Aembit displays the new Client Workload on the Client Workloads page.

The following table shows commonly used claim names and example values. The exact claims available depend on your identity provider and its configuration.

Claim nameDescriptionExample value
emailUser’s email addressuser@example.com
subSubject identifier (user or principal)user@example.com or an opaque ID
issIssuer URL of the identity providerhttps://your-org.okta.com
audIntended audience of the tokenhttps://your-tenant.id.aembit.io
tenant_idCustom organizational identifieracme-corp
departmentCustom department claimengineering