The OIDC Provider from BankID supports two general classes of Access Tokens.
The Authorization Context of an Access Token referes to attributes such as:
iss)
of the access token. See corresponding claim in ID Token.sub)
of the access token, ie. a reference to the end-user (resource owner) that authorized the access token. See corresponding claim in ID Token.aud)
for the access token, ie. a reference to the Protected Resouce that the access token regulates access to. Note that this is not related to the corresponding claim in the ID Token. The audience for the ID Token (being the OIDC Client) is different from the audience for an Access Token (being the Resource Server in question). exp)of
the access tokenThe OIDC Provider issues different types of Access Tokens to OIDC Clients depending on the requested types of Protected Resources (as given by the Scopes and Claims contained in the request). The OIDC Provider returns by default a standard bearer token of generic nature having the following characteristics:
aud)
attribute.The default token can be used by any Resource Server that is registered with (and hence trust) the OIDC Provider from BankID. The TINFO (Userinfo) service accepts the default token. The PSD2 Service does in contrast defined a set of customized tokens, including both by-reference tokens and self-contained tokens, for access to Protected Resources.
Support for other types of access tokens may be added to support authorization for other kinds of Protected Resources.