apps/docs/content/guides/manage/customize/user-metadata.mdx
This guide shows you how to request metadata from a user. ZITADEL offers multiple methods to retrieve metadata. Pick the one that works best for your solution.
Typical use cases for user metadata include:
Before you start you need to add some metadata to an existing user. You can do so by using Console or setting user metadata through the management API.
Most of the methods below require you to login with the correct user while setting some scopes. Make sure you pick the right user when logging into the test application. Use the OIDC authentication request playground or the settings of an example application to set the required scopes and receive a valid access token.
<Callout title="Getting a token"> In case you want to test out different settings configure an application with code flow (PKCE). Grab the code from the url parameter after a successful login and exchange the code for tokens by calling the [token endpoint](/apis/openidoauth/endpoints#token-endpoint). You will find more information in our guides on how to [authenticate users](/guides/integrate/login/oidc/login-users). </Callout>Use one of these methods to get the metadata for the currently logged in user.
In case you want to manage metadata for other users than the currently logged in user, then you must use the UserService API.
With the access token we can make a request to the userinfo endpoint to get the user's metadata. This method is the preferred method to retrieve a user's information in combination with opaque tokens, to insure that the token is valid.
You must pass the reserved scope urn:zitadel:iam:user:metadata in your authentication request.
If you don't include this scope the response will contain user data, but not the metadata object.
Request the user information by calling the userinfo endpoint:
curl --request GET \
--url "https://${CUSTOM_DOMAIN}/oidc/v1/userinfo" \
--header "Authorization: Bearer $ACCESS_TOKEN"
Replace $ACCESS_TOKEN with your user's access token.
The response will look something like this
{
"email": "[email protected]",
"email_verified": true,
"family_name": "Runner",
"given_name": "Road",
"locale": "en",
"name": "Road Runner",
"preferred_username": "[email protected]",
"sub": "166.....729",
"updated_at": 1655467738,
//highlight-start
"urn:zitadel:iam:user:metadata": {
"ContractNumber": "MTIzNA"
}
//highlight-end
}
You can grab the metadata from the reserved claim "urn:zitadel:iam:user:metadata" as key-value pairs.
Note that the values are base64 encoded.
So the value MTIzNA decodes to 1234.
You might want to include metadata directly into the ID Token. For that you need to enable "User Info inside ID Token" in your application's settings.
Now request a new token from ZITADEL by logging in with the user that has metadata attached. Make sure you log into the correct client/application where you enabled the settings.
The result will give you something like:
{
"access_token": "jZuRixKQTVecEjKqw...kc3G4",
"token_type": "Bearer",
"expires_in": 43199,
"id_token": "ey...Ww"
}
When you decode the value of id_token, then the response will include the metadata claim:
{
"amr": ["password", "pwd", "mfa", "otp"],
"at_hash": "lGIblkTr8faHz2zd0oTddA",
"aud": [
"170086824411201793@portal",
"209806276543185153@portal",
"170086774599581953"
],
"auth_time": 1687418556,
"azp": "170086824411201793@portal",
"c_hash": "dA3wre4ytCJCn11f7cIm0A",
"client_id": "1700...1793@portal",
"email": "[email protected]",
"email_verified": true,
"exp": 1687422272,
"family_name": "Runner",
"given_name": "Road",
"iat": 1687418672,
"iss": "https://...-abcd.zitadel.cloud",
"locale": null,
"name": "Road Runner",
"preferred_username": "[email protected]",
"sub": "170848145649959169",
"updated_at": 1658329554,
//highlight-start
"urn:zitadel:iam:user:metadata": {
"ContractNumber": "MTIzNA"
}
//highlight-end
}
Note that the values are base64 encoded.
So the value MTIzNA decodes to 1234.
You can use the authentication service to request and search for the user's metadata.
The introspection endpoint and the token endpoint in the examples above do not require a special scope to access.
Yet when accessing the authentication service, you need to pass the reserved scope urn:zitadel:iam:org:project:id:zitadel:aud along with the authentication request.
This scope allows the user to access ZITADEL's APIs, specifically the authentication API that we need for this method.
Use the OIDC authentication request playground or the settings of an example application to set the required scopes and receive a valid access token.
You can request the user's metadata with the List My Metadata method:
curl -L -X POST "https://${CUSTOM_DOMAIN}/auth/v1/users/me/metadata/_search" \
-H 'Content-Type: application/json' \
-H 'Accept: application/json' \
-H "Authorization: Bearer ${ACCESS_TOKEN}" \
--data-raw '{
"query": {
"offset": "0",
"limit": 100,
"asc": true
},
"queries": [
{
"keyQuery": {
"key": "${METADATA_KEY}",
"method": "TEXT_QUERY_METHOD_EQUALS"
}
}
]
}'
Replace ${ACCESS_TOKEN} with your user's access token.
Replace ${CUSTOM_DOMAIN} with your ZITADEL instance's url.
Replace ${METADATA_KEY} with they key you want to search for (f.e. "ContractNumber")
An example response for your search looks like this:
{
"details": {
"totalResult": "1",
"processedSequence": "2935",
"viewTimestamp": "2023-06-21T16:01:52.829838Z"
},
"result": [
{
"details": {
"sequence": "409",
"creationDate": "2022-08-04T09:09:06.259324Z",
"changeDate": "2022-08-04T09:09:06.259324Z",
"resourceOwner": "170086363054473473"
},
"key": "ContractNumber",
"value": "MTIzNA"
}
]
}
When you build your own registration UI you have the possibility to have custom fields and add them to the metadata of your user. Learn everything about how to build your own registration UI here.
The previous methods allowed you to retrieve metadata only for the sub in the access token.
In case you want to manage metadata for another user, use the User Service API.
The calling user must have the user.write permission to set or delete metadata.
Use SetUserMetadata to insert or update metadata entries. Existing keys not included in the request are left unchanged. To delete a metadata entry, pass the key with an empty value — if the key does not exist, it is ignored. You can mix inserts, updates, and deletions in a single request.
Alternatively, use DeleteUserMetadata to delete one or more keys explicitly.
Use ListUserMetadata to retrieve metadata for a user with optional filtering by key.