Key capabilities
Client Scopes
Named collections of claims assigned per client. Different apps get different token contents — no one-size-fits-all.
Protocol Mappers
Rules that extract data from the user and inject it as JWT claims. Map roles, attributes, or hardcoded values.
Standard OIDC
Ships with openid, profile, email, address, phone, offline_access, and introspect scopes pre-configured.
Default vs Optional
Default scopes are always included. Optional scopes are only included when the client explicitly requests them.
Custom Claims
Add business-specific claims — department, plan tier, feature flags — through custom protocol mapper rules.
Minimal Exposure
Public mobile apps get sub and email. Internal admin tools get realm_roles. Fine-grained data minimization.
How it works
Client requests scopes
During authentication, the client specifies which scopes it needs (e.g., openid email profile).
Scopes resolved
Aegis looks up the client's default scopes and merges in any requested optional scopes.
Mappers executed
Each protocol mapper in the resolved scopes runs — extracting data from the user object and producing claims.
Claims assembled
All claims are merged into the final JWT payload and signed. Only the requested data is included.
Ready to use Aegis?
Full reference, configuration options, and examples in the documentation.