Access tokens
Build on Kinde
During authentication, ID tokens carry information about authenticated users securely to your application.
at_hash
ensures the integrity of the claim made in the access token.aud
claim. This could be your kinde domain or app URI, e.g. https://<your_subdomain>.kinde.com
auth_time
indicates the time when the user was authenticated. It’s useful for scenarios where certain actions are allowed only if the user has recently authenticated.azp
claim specifies the client ID of the party to which the ID Token was originally issued.email
associated with the user’s profileexp
claim specifies the timestamp when the ID token expires and should no longer be considered valid. It helps prevent the token from being used indefinitely. More about setting token expiry in Kinde.iat
claim indicates the timestamp when the ID token was issued. It can be used to determine the token’s age and to mitigate replay attacks.iss
claim specifies the issuer of the ID token, usually the URL of the authorization server or identity provider. It’s used to verify the token’s authenticity.picture
claim contains the location reference of the avatar picture of the user, if there is one.sub
claim is a unique identifier for the authenticated user within the context of the issuing authentication server. In Kinde, this is the user’s ID.jti
claim is the unique identifier of the ID tokenupdated_at
claim specifies the issuer of the ID token, usually the URL of the authorization server or identity provider. It’s used to verify the token’s authenticity.family_name
claim contains the user’s last namegiven_name
claim contains the user’s first namename
contains the first name and last name of the userprovided_id
is the user‘s unique identification code in your systemorg_codes
claim contains an array of IDs for the Kinde organizations that the user belongs to.