Skip to content

Userinfo Endpoint

The userinfo endpoint returns identity claims about the currently authenticated user, as specified by OpenID Connect Core.

GET /t/{slug}/protocol/openid-connect/userinfo
Authorization: Bearer ACCESS_TOKEN

Authentication required — pass a valid access token with the openid scope.

The claims returned depend on the scopes granted to the access token:

{
"sub": "42",
"name": "Alice Smith",
"preferred_username": "alice",
"email": "alice@example.com",
"email_verified": true
}
ClaimScope requiredDescription
subopenidSubject — the user’s internal ID as a string
nameprofileUser’s full display name
preferred_usernameprofileUser’s username
emailemailUser’s email address
email_verifiedemailWhether the email has been verified

Most applications should prefer reading claims from the ID token or access token JWT directly, rather than calling the userinfo endpoint. The ID token is already signed and contains the same claims — decoding it locally is faster and avoids a network round-trip.

The userinfo endpoint is useful when:

  • Your access token is opaque (not a JWT)
  • You need the most current claim values (the token was issued before the user updated their profile)
  • Your OIDC library requires it as part of its standard flow
StatusCondition
401 UnauthorizedMissing, expired, or malformed access token
403 ForbiddenToken does not have the openid scope