This article describes how to get custom profile attributes using an Org Authorization Server.
- Okta Org Authorization Server
- OpenID Connect (OIDC) (Authentication) use case only
- Implicit, Authorization Code, or Resource Owner Password grant types
- Create a custom user profile attribute by navigating to Directory > Profile Editor > User (default).
- Click on Add Attribute, enter the details, and Save.
- Go to Directory > People > select the user > under the Profile tab > click Edit > add a value.
- Create a custom attribute on the OIDC App by navigating to Directory > Profile Editor > Apps > click on the OIDC App > Add Attribute.
- Under Mappings > Okta User to OIDC App, map the attribute from Okta to the OIDC App.
-
- Link the attribute (Select from the drop-down).
- Select the desired option.
- Save Mappings.
- Link the attribute (Select from the drop-down).
- The custom profile attribute can be found by calling the /userinfo endpoint, as documented in the Attribute/Claim Missing from ID Token article.
NOTE: Both scopes (openid, profile) are required in the request to see the custom attribute at the/userinfo endpoint.
