OIDC provides identity and access delegation with standardized OAuth 2.0 flows. PCI DSS enforces strict controls for handling cardholder data. Combining them requires precision. Every token, every claim, every redirect can become a threat surface if not mapped to a hardened process.
Tokenization replaces sensitive card numbers with unique tokens that cannot be reversed without secure keys. In PCI DSS context, this isolates card data from the primary transaction systems. When OIDC is in play, identity tokens often meet API calls that trigger payment functions. Any crossover between identity scopes and payment flows must be explicit, controlled, and logged.
A strong approach begins with decoupling authentication from payment processing. Use OIDC to create a secure identity pipeline: validated client apps, trustworthy issuers, signed ID tokens. Then pass only non-sensitive identifiers into the payment modules. PCI DSS tokenization should occur in a separate, constrained service that stores no raw PAN data.