However, contrary to what is stated in the documentation (see above), the custom claims are not part of the access application token and therefore cannot be processed by the actual application.
Am I missing something here?
EDIT: See Access JWTs documentation for clarification on what I’m referring to with global session token & application token
I can confirm that the custom OIDC fields can be accessed using the Get-Identity access point. As some of our most protected apps are heavily restricted in terms of outbound connection permissions, it would be easier if the values are a part of the access token.
Plus, the documentation suggests that this should already be the case:
…enter custom OIDC claims that you wish to add to your Access application token.
So, I’m wondering if there are any plans to implement that in the near future? I understand that due to bandwidth considerations, only a subset of the user’s identity is available. Still, I would assume that values that are explicitly added as custom OIDC claims might need to be accessed quite frequently.
If not, it might be helpful to others to update the documentation accordingly.