OIDC ID Token
This page explains how to use the OIDC ID Token identifier to match any claim in an OIDC ID token from a standards-compliant identity provider.
Understanding the OIDC ID Token identifier
Section titled “Understanding the OIDC ID Token identifier”Unlike the dedicated Audience,
Issuer, and
Subject identifiers,
the OIDC ID Token identifier lets you match on any claim in the token.
You specify both a Claim Name (the JWT claim key, such as email) and a Claim Value (the expected string
the claim must equal).
Aembit evaluates the token, locates the claim by name, and checks whether its value matches.
Use this identifier to restrict access based on custom or non-standard token attributes. Examples include a user’s email address, a custom group membership field, or an organizational attribute your identity provider adds to tokens.
Applicable deployment type
Section titled “Applicable deployment type”Use this identifier when your Client Workload authenticates using an OIDC ID token from a standards-compliant identity provider. The Access Policy must include an OIDC ID Token Trust Provider configured to validate tokens from the same identity provider.
Supported environments include:
- CI/CD pipelines (GitLab CI/CD, GitHub Actions, Terraform Cloud)
- Workloads using the Aembit MCP Identity Gateway
- Any workload that presents a standards-compliant OIDC token to the Aembit Edge Component
Create a Client Workload with an OIDC ID Token identifier
Section titled “Create a Client Workload with an OIDC ID Token identifier”-
Log into your Aembit Tenant.
-
In the sidebar, click Client Workloads.
-
Click + New to open the Client Workload editor panel.
-
Enter the Name and optional Description for the Client Workload.
-
Under Client Identification, select OIDC ID Token.
For Claim Name, enter the JWT claim you want to match on. The field offers
Subject,Issuer, andAudienceas common suggestions, but accepts any valid claim name.For Claim Value, enter the expected string value of that claim.
For example, to match on a user’s email address:
- Claim Name:
email - Claim Value:
user@example.com
- Claim Name:
-
Click Save.
Aembit displays the new Client Workload on the Client Workloads page.
Common custom claim examples
Section titled “Common custom claim examples”The following table shows commonly used claim names and example values. The exact claims available depend on your identity provider and its configuration.
| Claim name | Description | Example value |
|---|---|---|
email | User’s email address | user@example.com |
sub | Subject identifier (user or principal) | user@example.com or an opaque ID |
iss | Issuer URL of the identity provider | https://your-org.okta.com |
aud | Intended audience of the token | https://your-tenant.id.aembit.io |
tenant_id | Custom organizational identifier | acme-corp |
department | Custom department claim | engineering |