Use scopes to set access rights, or permissions, for web apps.
To use the Express console: Go to Applications > App Name > API Scopes.
With scopes, you define permissions for a web app to limit the app’s abilities and risks. For example, you might configure an app that allows users to manage their own accounts. You can include scopes that allow the user to reset their own password, and edit their username and contact information.
Or you might set up service app that can upload multiple users at once. In this case you could set up scopes that enable only the service to access to the user database.
Using Scopes to Access the Management API
To access information on the Management API, the application must request and be allowed access. The app sends a request through the ForgeRock authorization server. The request goes to the entities it wants to perform RESTful API operations on. These scopes are then granted using an access token returned to the application, which can then be used to pull information from the APIs.
ForgeRock uses the following format to set access rights to the Management API
/apps: For all applications.
/password-policy: Global password policy configuration.
/me: For the signed-in user.
/users: User management.
/email-templates: Templates for new users, password reset, and account verification.
/email-server: For configuring an external SMTP server
/hosted-page: For configuring hosted pages with GET and PUT.
/team-members: For administrative users.
Using OIDC Scopes to Access User Information
Apps can use OpenID Connect (OIDC) scopes to access user information either in the ID token or in the /userinfo endpoint. Claims contain one or more pieces of information about a user.
OIDC requests must include the following scope:
OIDC requests can also include the following scopes, which are associated with the following voluntary claims.
profile: name, family_name, given_name, nickname, preferred_username, profile, picture, website, gender, birthdate, zoneinfo, locale, updated_at
A voluntary claim does not have to be included. For example, if you ask for information about a user without a picture, the app does not have to return that claim for the user.
For more information on OIDC Scopes, see:
- OpenID Connect Specification, Authentication Request
- OpenID Connect Specification on Requesting Claims using Scope Values
For questions or feedback, contact us.