Skip to the content.

Scopes

There are two different types of scopes. “Identity scopes” and “API Scopes”.

Identity Scopes

The most commonly used scopes and which claims they return.

Each scope returns a set of user attributes which are called claims. The scopes an application should request depend on which user attributes the application needs.
Claims are returned either directly in the id_token or can be fetched via the /userinfo endpoint.

Scope Where Description/Returned Claims
openid /token To indicate that the application intends to use OIDC to verify the user’s identity Returns the sub claim which uniquely identifies the end user. Returns an ID Token in addition to the Access Token
ial0   Identity Assurance Level 0
ial1   Identity Assurance Level 1
ial2   Identity Assurance Level 2
profile /userinfo Adds the following name attributes:given\_name, family\_name, birthdate, kurtid, analytics_uuid
email /userinfo email address
phone /userinfo phone number
tnn.ids access_token kurtid, tnuid
offline_access   to get a refresh token, read more.
extsub access_token used towards tsl.capture, this will add the attributes aud and extsub to the access_token, only in use with TelenorID logins
tnn.legacy /userinfo adds the following attributes to the userinfo: legacy_username, legacy_usertype, legacy_status, legacy_roles
account.profiles /userinfo Gives access to all profiles associated with the given Account. Only needed if you use token exchange

API Scopes

Each client must explicitly request the scopes they need.

API scopes (scopes for access to Telenor APIs on Apigee) will not be visible on well-known as they are located and managed on the Apigee / Developer portal.
IBIS will take all the scopes that start with “api:” and send them to Apigee for lookup. In practice, a client is stored at both IBIS and Apigee, but we make sure to keep it in sync.

Existing api:<apigee_service> scopes will not change and will remain the same as used today.

API-EXP-SCOPES