Overview
hConnect solves the fragmentation problem of identity providers by standardizing user attributes across all eID providers. No matter which provider your users choose, you receive consistent, predictable data formats.The Problem: Data Chaos
Each identity provider uses different attribute names for the same user information, creating significant integration complexity: Example: Attribute Naming Chaos| Information | Provider A | Provider B | Provider C |
|---|---|---|---|
| First Name | firstName | given_name | firstname |
| Last Name | lastName | family_name | surname |
| Birth Date | dateOfBirth | birthdate | dob |
| National ID | personalNumber | ssn | nationalNumber |
- Write custom mapping logic for each provider
- Maintain provider-specific code branches
- Handle different date formats and data types
- Update your code when providers change their schemas
Normalized Attributes
hConnect maps all provider variations into a attribute set based on OpenID Connect Standard Claims. These are standard OpenID Connect claims representing the user’s identity.| Attributes | Type | Required | Notes/Example |
|---|---|---|---|
name | string | No | Full name |
given_name | string | No | |
family_name | string | No | |
middle_name | string | No | |
nickname | string | No | |
preferred_username | string | No | |
profile | string | No | URL |
picture | string | No | Base64-encoded image data |
gender | string | No | female, male, other |
birthdate | string | No | YYYY-MM-DD |
locale | string | No | BCP 47 (en-US) |
email | string | No | user@example.com |
email_verified | boolean | No | true/false |
phone_number | string | No | E.164 (+1415555…) |
phone_number_verified | boolean | No | true/false |
address | object | No | See Address structure below |
nationality | string | No | ISO 3166-1 alpha-2 |
Address Claim Structure
| Attributes | Type | Notes/Format |
|---|---|---|
street_address | string | Street/house/PO Box |
locality | string | City |
region | string | State/Province/Region |
postal_code | string | ZIP/Postal code |
country | string | ISO 3166-1 alpha-2 |
Personal attributes are returned under
/userinfo.user.*. The ID Token contains no PII; it carries only technical claims (for example: sub, acr, hopae_loa)./userinfo.user:
Data Availability
Not all attributes are available from all providers. The availability depends on each provider’s capabilities and user consent.If a claim is absent, check
missing_claims in /userinfo. Claims listed there weren’t provided by the source — handle fallbacks accordingly.Next Steps
OIDC Integration
Implement standardized attributes
OIDC UserInfo
Retrieve detailed context and evidence
Provider Reference
Available providers and coverage
Verification Process
Understanding the flow

