Skip to main content

Tokens

azuma doa issues three types of tokens depending on the authentication flow:

  • Access Token: Used to authenticate API requests.
  • Identity Token: Contains user identity information (specific to OpenID Connect flows).
  • Refresh Token: Used to obtain new access tokens without re-authenticating the user.

For more details, refer to the OAuth 2.0 Specification.

Device Binding

In the Device Binding flow azuma doa issues only Access Token and Refresh Token.

Access Token format

{
"aud": [
"803ad030-10a2-417a-bd19-7ad7ccc2dc9d"
],
"client_id": "803ad030-10a2-417a-bd19-7ad7ccc2dc9d",
"exp": 1751195134,
"ext": {
"authorized_scopes": [],
"kind": "initial",
"licenses": [],
"linked_authentications": [],
"permissions_app": [],
"security_mode": "device-binding",
"tenant_id": "d23e6db7-683b-4411-9ede-8ec040816de7"
},
"iat": 1751191533,
"iss": "https://oidc.pie.azuma-health.tech",
"jti": "d220c0e7-9b85-456f-b503-1d04505a6f6f",
"nbf": 1751191533,
"scp": [
"offline_access",
"permissions_app",
"licenses"
],
"sub": "f09af826-8b73-46d6-80c5-57646e4d1384"
}
ClaimDescription
audContains your application-ID
client_idYour application-ID, that the device binding tokens were requested for.
ext: authorized_scopesThe scopes the client was authorized for. This is always empty in the device binding flow.
ext: kindinitial for the initially returned token after user authentication. refresh for a token that was retrieved via Refresh Token.
ext: licensesContains user licenses if defined and assigned.
ext: linked_authenticationsContains the linked authentications (see below for format).
ext: permissions_appContains user permissions if defined and assigned.
ext: security_modeAlways set to device-binding for the device binding flow.
ext: tenant_idThe tenant ID.
scpScopes.
exp, iat, iss, jti, nbfDefault claims

Linked Authentications

{
"provider": "mimoto",
"sub": "https://gsi.dev.gematik.solutions-*id*-https://mimoto-test.pie.azuma-health.tech/oidcf/azuma-demo-tu"
}

Currently, only mimoto is supported.

Authorization Code

Access Token Format

The format for access tokens in the Authorization Code flow will be documented in a future update. Stay tuned for more details.

Client Credentials

Access Token format

{
"client_id": "159c733f-f1e9-4e9c-96c7-248486408b40",
"exp": 1754066469,
"ext": {
"authorized_scopes": [
"tenant_admin"
],
"tenant_id": "71c470c6-f6a1-4e59-b105-d8587c364f47"
},
"iat": 1754062869,
"iss": "https://oidc.pie.azuma-health.tech",
"jti": "388fbeaf-5691-44d1-b2b7-00e7cf3a3cad",
"nbf": 1754062869,
"scp": [
"71c470c6-f6a1-4e59-b105-d8587c364f47_admin"
],
"sub": "159c733f-f1e9-4e9c-96c7-248486408b40"
}
ClaimDescription
subYour client-ID
ext: authorized_scopesThe scopes the client was authorized for (this is an extension added for the admin-scope that was requested
ext: tenant_idThe tenant ID the client was authorized for
scpClient scopes
exp, iat, iss, jti, nbfDefault claims