
Overview
- Who is the user? → returned under
user. - How was this identity verified? → described by
provenance.
What “Provenance” Means
Provenance explains the verification story — who vouched for the identity, how it was presented, and when it happened.- Presentation
- Channel: the route and transport (for example,
centralized_idpoverinternet,chip_basedvianfc,walletoverinternet). - Credentials[]: the documents or assertions that were presented (
typeis the provider identifier, alongside issuer details and raw upstream claims). - Evidence (when provided)
- Evidence is included when the credential provides it; the object relays the upstream
tokenpayload and a semicolon-delimitednameslist describing the keys. Key names are provider-specific—always read them fromnames. Content is relayed from the credential source.
- Evidence is included when the credential provides it; the object relays the upstream
- Channel: the route and transport (for example,
- Metadata
- Verification identifiers and timestamps for audit and support (
verification_id,verified_at).
- Verification identifiers and timestamps for audit and support (
UserInfo Payload Structure
Here is a conceptual map of the UserInfo payload. This tree view shows how the data is organized, with a brief explanation for each major component. For detailed field specifications, refer to the Schema Tables that follow this section.Related
Next Steps
OIDC Provider
How OIDC fits into User Verification
Verification Flow
Understand the end-to-end lifecycle

