You can change the sub
JSON Web Token (JWT) claim for the OpenID
Connect (OIDC) user ID under the option file's core
section.
By default, when a user signs on to the Policy Editor with OIDC, the Policy Editor uses the sub
JWT claim in the following
operations:
- Extracts the
sub
claim value from the ID token and:- Records the
sub
claim value in the Creator column of the Commits table when the user makes commits (see )
- Records the
- Makes a request to the UserInfo endpoint and:
- Uses the
sub
claim value from the response as the user data - Displays the user data in the upper right of the page
- Uses the
If your organization wants to use a non-default claim for the OIDC user ID, such as
email
, you can define this claim by completing the following
steps.
Important:
You must configure your OIDC provider to include the claim in both the UserInfo endpoint and the ID token for the name to display. See your OIDC provider's documentation for instructions.