The claim defined by the mapping is returned in the ID token, regardless of the scopes specified in the authorization request. For example, if you want to include a user’s account ID in ID tokens associated with the specified OpenID Connect (OIDC) application, you can map the user’s account ID to the accountId PingOne user attribute.

You can map PingOne user attributes or static attributes to custom attributes in the application you are adding.