ZTrust Documentation
  • User Manual - ZTrust V3.0
    • Key Terminologies
    • Guide to Navigation
      • Clients
        • Clients List
        • Initial Access Token
        • Client Registration
      • Client Scopes
      • Realm Roles
      • Users
      • Groups
      • Sessions
      • Events
        • User events
        • Admin events
      • Realm Settings
        • General
        • Login
        • Email
        • Themes
        • Keys
        • Events
        • Localization
        • Security Defenses
        • Sessions
        • Tokens
        • Client Policies
        • User profile
        • User Registration
      • Authentication
        • Flows
        • Required Actions
        • Policies
      • Identity Providers
      • User Federation
    • Admin Manual
      • Creation of a Realm
      • Creation of a User
        • Login to Account Console
      • How to set up Password Invalidator
      • How to set up Password Policies
      • How to set up Brute Force Detection feature
      • How to enable the One-to-Many feature
      • How to set up Multi-Factor Authentication
        • Setup of ReCAPTCHA registration flow
        • Setup of ReCAPTCHA login flow
        • Setup of OTP Based Registration
        • Setup of OTP Based Login
        • Setup of QR Code Based Authentication
        • Setup of Push Notification Based Authentication
        • Setup of Biometric based Authentication
        • How to set-up 2FA Authentication
      • ZTrust Authenticator App
      • Self-Service Portal (SSP)
        • Authenticator Setup from Self-Service Portal
        • Set Your Profile Photo in Self-Servicce Portal
      • How to setup Session Invalidator feature
      • How to setup GDPR Compliant feature
      • How to set up Social Media login
      • How to setup Inactive User Tracking feature
      • How to setup Archive Inactive User feature
      • Role-Specific Attribute Based Access Control at client level
      • Self-Role Request at the Business Level
      • Self-Role Request at the Application Level
      • How to setup Delete Archived/Inactive User feature
      • Reporting Module
      • Geo Tagging and Fencing
      • Event Type
  • Release Notes
    • ZTrust V3.1.0
    • ZTrust V3.0.0
    • ZTrust V2.1.0
    • ZTrust V2.0.1
    • ZTrust V2.0.0
    • ZTrust V1.0.4
    • ZTrust V1.0.3
    • ZTrust V1.0.2
    • ZTrust V1.0.1
    • ZTrust V1.0.0
  • Frequently Asked Questions
  • User Manual - ZTrust V2.0
    • Key Terminologies
    • Guide to Navigation
      • Clients
        • Clients List
        • Initial Access Token
        • Client Registration
      • Client Scopes
      • Realm Roles
      • Users
      • Groups
      • Sessions
      • Events
        • User events
        • Admin events
      • Realm Settings
        • General
        • Login
        • Email
        • Themes
        • Keys
        • Events
        • Localization
        • Security Defenses
        • Sessions
        • Tokens
        • Client Policies
        • User profile
        • User Registration
      • Authentication
        • Flows
        • Required Actions
        • Policies
      • Identity Providers
      • User Federation
    • Admin Manual
      • Creation of a Realm
      • Creation of a User
        • Login to Account Console
      • How to set up Password Invalidator
      • How to set up Password Policies
      • How to set up Brute Force Detection feature
      • How to enable the One-to-Many feature
      • How to set up Multi-Factor Authentication
        • Setup of ReCAPTCHA registration flow
        • Setup of ReCAPTCHA login flow
        • Setup of OTP Based Registration
        • Setup of OTP Based Login
        • Setup Time-based One-Time Password (TOTP) Based Login
        • Setup of QR Code Based Authentication
        • Setup of Push Notification Based Authentication
        • Setup of Biometric based Authentication
        • How to set-up 2FA Authentication
      • How to setup Session Invalidator feature
      • How to setup GDPR Compliant feature
      • How to set up Social Media login
      • How to setup Inactive User Tracking feature
      • How to setup Archive Inactive User feature
      • How to setup Delete Archived/Inactive User feature
      • Role-Specific Attribute Based Access Control at client level
      • Reporting Module
      • Geo Tagging and Fencing
      • Event Type
  • User Manual - ZTrust V1.0
    • Guide to Navigation
      • Realm Settings
        • General
        • Login
        • Keys
        • Email
        • Themes
        • RabbitMQ Config
        • Localization
        • Cache
        • Tokens
        • Client Registration
        • Client Policies
        • Security Defenses
      • Clients
      • Client Scopes
        • Default Client Scopes
      • Roles
        • Realm Roles
        • Default Roles
      • Identity Providers
      • User Federation
      • Authentication
        • Flows
        • Bindings
        • Required Actions
        • Password Policy
        • OTP Policy
        • WebAuthn Policy
        • WebAuthn Passwordless Policy
        • CIBA Policy
      • Groups
        • Default Groups
      • Users
      • Sessions
        • Realm Sessions
        • Revocation
      • Events
        • Login Events
        • Admin Events
        • Config
      • Import
      • Export
    • Admin Manual
      • Creation of a Realm
      • Creation of a User
        • Login to Account Console
      • How to set up Password Invalidator
      • How to set up Password Policies
      • How to set up Brute Force Detection feature
      • How to enable the One-to-Many feature
      • How to set up Multi-Factor Authentication
        • Setup of ReCAPTCHA registration flow
        • Setup of ReCAPTCHA login flow
        • Setup of OTP Based Registration
        • Setup of OTP Based Login
        • Setup of QR Code Based Authentication
        • Setup of Push Notification Based Authentication
        • Setup of Biometric based Authentication
      • How to setup Session Invalidator feature
      • How to setup GDPR Compliant feature
      • How to set up Social Media login
      • How to setup Inactive User Tracking feature
      • How to setup Archive Inactive User feature
      • How to setup Delete Archived/Inactive User feature
Powered by GitBook
On this page
  1. User Manual - ZTrust V1.0
  2. Guide to Navigation

Client Scopes

PreviousClientsNextDefault Client Scopes

Last updated 1 year ago

Name

This indicates the name of the client scope, which must be unique within the Realm.

Protocol

This defines the protocol configuration provided by this client scope.

You can choose the most suitable option from the dropdown based on your needs.

GUI order

It defines the provider's position in the GUI as an integer.

Actions

It lists the available actions that can be performed on the client scope, such as Edit or Delete.

Edit

If you wish to modify any settings related to the client scope, select Edit.

Delete

If you want to remove a specific client scope, click on Delete.

Create

If you want to establish a new client scope, click on Create.

Upon clicking Create, you will be directed to the following screen.

Name

This indicates the name of the client scope, which must be unique within the Realm.

The name should not include space characters, as it is utilized as the value of the scope parameter.

Description

It refers to the description for the client scope, which will be helpful in identifying the purpose of the client.

Protocol

This defines the protocol configuration provided by this client scope.

You can choose the most suitable option from the dropdown based on your needs.

Display On Consent Screen

This toggle button, when activated (toggled ON), will display the text specified by Consent Screen Text on the consent screen if this client scope is added to a client with consent required.

If deactivated (toggled OFF), this client scope will not appear on the consent screen.

You can toggle it ON or OFF according to your needs.

Consent Screen Text

This pertains to the text that will be shown when this client scope is added to a client with consent required.

By default, it displays the name of the client scope if left empty.

Include In Token Scope

This toggle button, when activated (toggled ON), will include the name of this client scope in the access token property scope and in the Token Introspection Endpoint response.

If deactivated (toggled OFF), this client scope will be excluded from the token and from the Token Introspection Endpoint response.

You can toggle it ON or OFF according to your needs.

GUI order

It defines the provider's position in the GUI as an integer.

Save

If you want to create a client scope with all the specified details, click on Save to apply your changes.

Reset

If you do not create the client scope with the provided details, click on Reset to discard the changes.

After clicking on Save, you will be taken to the following screen.

Mappers

Protocol Mappers facilitate transformations on tokens and documents.

They are capable of tasks such as mapping user data into protocol claims or transforming any requests exchanged between the client and authentication server.

You can utilize the available Search box to search for any mapper.

Create

To create a new Protocol Mapper, simply click on Create.

Upon clicking on Create, you will be redirected to the screen below.

Protocol

This is non-editable and defaults to openid-connect.

Name

This denotes the name of the mapper, which you can customize according to your needs.

Mapper Type

This indicates the type of mapper that you can create.

You can review the table below to observe the various types of mappers and their respective purposes.

Mapper Type
Description

Claims parameter Token

The claims specified by the claims parameter are included in the tokens.

User Realm Role

Associate the user realm role with a token claim.

User Session Note

Connect a custom user session note to a token claim.

Claims parameter with value ID Token

User Address

Associate user address attributes (street, locality, region, postal_code, and country) with the OpenID Connect ‘address’ claim.

Role Name Mapper

Assign a role to a new name or position in the token.

User Client Role

Associate a user client role with a token claim.

User Property

Map a built-in user property (email, firstName, lastName) to a token claim.

Authentication Context Class Reference (ACR)

Hardcoded Role

Hardcode a role into the access token.

Hardcoded claim

Hardcode a claim into the token

Pairwise subject identifier

User’s full name

Associates the user's first and last name with the OpenID Connect 'name' claim.

Allowed Web Origins

Includes all permitted web origins in the 'allowed-origins' claim within the token.

Audience

Append the specified audience to the 'audience' (aud) field of the token.

User Attribute

Connect a custom user attribute with a token claim.

Group Membership

Map user group membership.

Audience Resolve

Include all client_ids of 'allowed' clients in the audience field of the token. An 'allowed' client refers to a client for which the user has at least one client role.

Add to ID Token

This toggle button controls whether the claim can be added to the ID Token.

When activated (toggled ON), the claim can be included in the ID Token.

Conversely, when deactivated (toggled OFF), the claim is not added to the ID Token.

You can adjust this setting as needed by toggling it ON or OFF.

Add to userinfo

This toggle button determines whether the claim should be added to the userinfo.

When activated (toggled ON), the claim will be included in the userinfo.

If deactivated (toggled OFF), the claim will not be added to the userinfo.

You can toggle this setting ON or OFF according to your requirements.

Save

To apply the changes you've made, click on Save.

Reset

If you prefer not to incorporate the changes, click on Reset to discard them.

You can also add built-in mappers by clicking on Add Builtin to select the necessary mappers.

Upon clicking on Add Builtin, you will be directed to the screen below.

Name

This displays the names of the existing builtin mappers.

Category

This section categorizes the mentioned mappers.

Type

This specifies the type of the builtin mappers.

Add

If you want to select a specific mapper from the builtin mapper list, click on the checkbox labeled Add for that particular mapper.

This will select the corresponding mapper.

At the bottom, there's an option to Add Selected. Click on Add Selected to add the chosen builtin mappers.

Once added, the particular mapper will be visible under the Mappers tab, as shown below.

Name

This displays the names of the existing builtin mappers.

Category

It specifies the category of the mappers mentioned.

Type

This specifies the type of the builtin mappers.

Priority Order

Mapper implementations are prioritized based on their order in the list of mappers.

Priority order is not the configuration property of the mapper. It is the property of the concrete implementation of the mapper.

This order dictates the sequence in which changes to the token or assertion are applied, with the lowest priority mappers being processed first.

This ensures that implementations dependent on others are executed in the required order.

Actions

It contains the available actions that can be taken on the built-in mappers, such as editing or deleting the mapper.

Edit

To edit any setting for a specific built-in mapper, click on Edit.

Delete

If you wish to delete that particular built-in mapper, click on Delete.

Upon clicking on Delete, you will receive a prompt asking for your confirmation.

Click on Delete if you want to remove the mapper; otherwise, click on Cancel.

Scope

This configuration enables you to limit the user role mappings included in the access token requested by the client.

Realm Roles

Available Roles

It lists all the Available Realm Roles that can be assigned to a scope. It includes roles that are effectively designated but not explicitly assigned.

Assigned Roles

It consists of the Realm Roles that have already been assigned to the scope.

Effective Roles

It includes all the assigned roles at the Realm level that could be derived from a composite role.

If you want to move any of the Available Roles to Assigned Roles, select the Role and click on Add Selected.

If you want to delete any of the Assigned Roles, select the Role and then click on Remove Selected.

Client Roles

Client roles are namespaces designated for clients, with each client having its own namespace.

These roles are managed within the Roles tab specific to each client.

You can assign the role to a particular client by selecting the preferred option from the dropdown menu.

Clicking on Edit will take you to the following screen.

Settings

Under this section, you can set up the basic configurations for a client scope.

Name

This indicates the name of the client scope, which must be unique within the Realm.

The name should not include space characters, as it is utilized as the value of the scope parameter.

This field can be edited, allowing you to customize it according to your needs.

Description

It refers to the description for the client scope, which will be helpful in identifying the purpose of the client.

Protocol

This defines the protocol configuration provided by this client scope.

You can choose the most suitable option from the dropdown based on your needs.

Display On Consent Screen

This toggle button, when activated (toggled ON), will display the text specified by Consent Screen Text on the consent screen if this client scope is added to a client with consent required.

If deactivated (toggled OFF), this client scope will not appear on the consent screen.

You can toggle it ON or OFF according to your needs.

When activated (turned ON), the Consent Screen Text field will become enabled.

Consent Screen Text

This pertains to the text that will be shown when this client scope is added to a client with consent required.

By default, it displays the name of the client scope if left empty.

You can tailor this setting to meet your specific needs.

Include In Token Scope

This toggle button, when activated (toggled ON), will include the name of this client scope in the access token property scope and in the Token Introspection Endpoint response.

If deactivated (toggled OFF), this client scope will be excluded from the token and from the Token Introspection Endpoint response.

You can toggle it ON or OFF according to your needs.

GUI order

It defines the provider's position in the GUI as an integer.

Save

If you wish to implement the modifications, click on Save to apply them.

Reset

If you prefer not to proceed with these changes, click on Reset to discard them.

Protocol Mappers facilitate transformations on tokens and documents.

They are capable of tasks such as mapping user data into protocol claims or transforming any requests exchanged between the client and authentication server.

You can utilize the available Search box to search for any mapper.

Create

To create a new Protocol Mapper, simply click on Create.

Upon clicking on Create, you will be redirected to the screen below.

Protocol

This is non-editable and defaults to openid-connect.

Name

This denotes the name of the mapper, which you can customize according to your needs.

Mapper Type

This indicates the type of mapper that you can create.

You can review the table below to observe the various types of mappers and their respective purposes.

Mapper Type
Description

Claims parameter Token

The claims specified by the claims parameter are included in the tokens.

User Realm Role

Associate the user realm role with a token claim.

User Session Note

Connect a custom user session note to a token claim.

Claims parameter with value ID Token

User Address

Associate user address attributes (street, locality, region, postal_code, and country) with the OpenID Connect ‘address’ claim.

Role Name Mapper

Assign a role to a new name or position in the token.

User Client Role

Associate a user client role with a token claim.

User Property

Map a built-in user property (email, firstName, lastName) to a token claim.

Authentication Context Class Reference (ACR)

Hardcoded Role

Hardcode a role into the access token.

Hardcoded claim

Hardcode a claim into the token

Pairwise subject identifier

User’s full name

Associates the user's first and last name with the OpenID Connect 'name' claim.

Allowed Web Origins

Includes all permitted web origins in the 'allowed-origins' claim within the token.

Audience

Append the specified audience to the 'audience' (aud) field of the token.

User Attribute

Connect a custom user attribute with a token claim.

Group Membership

Map user group membership.

Audience Resolve

Include all client_ids of 'allowed' clients in the audience field of the token. An 'allowed' client refers to a client for which the user has at least one client role.

Add to ID Token

This toggle button controls whether the claim can be added to the ID Token.

When activated (toggled ON), the claim can be included in the ID Token.

Conversely, when deactivated (toggled OFF), the claim is not added to the ID Token.

You can adjust this setting as needed by toggling it ON or OFF.

Add to userinfo

This toggle button determines whether the claim should be added to the userinfo.

When activated (toggled ON), the claim will be included in the userinfo.

If deactivated (toggled OFF), the claim will not be added to the userinfo.

You can toggle this setting ON or OFF according to your requirements.

Save

To apply the changes you've made, click on Save.

Reset

If you prefer not to incorporate the changes, click on Reset to discard them.

You can also add built-in mappers by clicking on Add Builtin to select the necessary mappers.

Upon clicking on Add Builtin, you will be directed to the screen below.

Name

This displays the names of the existing builtin mappers.

Category

This section categorizes the mentioned mappers.

Type

This specifies the type of the builtin mappers.

Add

If you want to select a specific mapper from the builtin mapper list, click on the checkbox labeled Add for that particular mapper.

This will select the corresponding mapper.

At the bottom, there's an option to Add Selected. Click on Add Selected to add the chosen builtin mappers.

Once added, the particular mapper will be visible under the Mappers tab, as shown below.

Name

This displays the names of the existing builtin mappers.

Category

It specifies the category of the mappers mentioned.

Type

This specifies the type of the builtin mappers.

Priority Order

Mapper implementations are prioritized based on their order in the list of mappers.

Priority order is not the configuration property of the mapper. It is the property of the concrete implementation of the mapper.

This order dictates the sequence in which changes to the token or assertion are applied, with the lowest priority mappers being processed first.

This ensures that implementations dependent on others are executed in the required order.

Actions

It contains the available actions that can be taken on the built-in mappers, such as editing or deleting the mapper.

Edit

To edit any setting for a specific built-in mapper, click on Edit.

Delete

If you wish to delete that particular built-in mapper, click on Delete.

Upon clicking on Delete, you will receive a prompt asking for your confirmation.

Click on Delete if you want to remove the mapper; otherwise, click on Cancel.

Scope

This configuration enables you to limit the user role mappings included in the access token requested by the client.

Realm Roles

Available Roles

It lists all the Available Realm Roles that can be assigned to a scope. It includes roles that are effectively designated but not explicitly assigned.

Assigned Roles

It consists of the Realm Roles that have already been assigned to the scope.

Effective Roles

It includes all the assigned roles at the Realm level that could be derived from a composite role.

If you want to move any of the Available Roles to Assigned Roles, select the Role and click on Add Selected.

If you want to delete any of the Assigned Roles, select the Role and then click on Remove Selected.

Client Roles

Client roles are namespaces designated for clients, with each client having its own namespace.

These roles are managed within the Roles tab specific to each client.

You can assign the role to a particular client by selecting the preferred option from the dropdown menu.

Claims specified with a value by the claims parameter are included in an .

Assign the achieved to the ‘acr’ claim of the token.

Generates a pairwise subject identifier using a .

Claims specified with a value by the claims parameter are included in an .

Assign the achieved to the ‘acr’ claim of the token.

Generates a pairwise subject identifier using a .

ID Token
Level of Authentication (LoA)
salted SHA-256 hash
ID Token
Level of Authentication (LoA)
salted SHA-256 hash