A single misconfigured claim in your OpenID Connect flow can leak more than you think.
It can expose the personal data you swore to protect.
OpenID Connect (OIDC) has become the default standard for authentication and identity in modern applications. It moves user profile information in JSON Web Tokens and API calls. But hidden in those claims are patterns of PII – personally identifiable information – that many teams never catalog, track, or control.
That’s the problem: if you can’t see where your PII flows, you can’t guarantee it’s safe.
Tokens pass through callbacks, stored in logs, cached in browsers, picked up by API gateways. Each claim — name, email, birthdate, address, even custom fields — can be PII. Each one has its own risk profile. Without a PII catalog for your OIDC integration, you don’t know your own exposure.
An OIDC PII catalog is simple in concept. It’s an authoritative list of every claim, attribute, and data element your system receives from your identity provider. It should flag which are PII, note how they are stored, and track their lifecycle across your services. This catalog turns OIDC from a black box into a transparent, auditable process.
A secure catalog answers these questions fast: