User data structure
Users are the core entities in the identity service. In Logto, they include basic authentication data based on the OpenID Connect protocol, along with custom data.
User profile
Each user has a profile containing all user information.
It consists of the following types of data:
- Basic data: is the basic info from the user profile. It stores all other user's properties except for social
identities
andcustom_data
, such as user id, username, email, phone number, and when the user last signed in. - Social identities: stores the user info retrieved from social sign-in (i.e., sign-in with a social connector), such as Facebook, GitHub, and WeChat.
- Custom data: stores additional user info not listed in the pre-defined user properties, such as user-preferred color and language.
Here is a sample of a user's data which is retrieved from a sign-in to Facebook:
{
"id": "iHXPuSb9eMzt",
"username": null,
"primaryEmail": null,
"primaryPhone": null,
"name": "John Doe",
"avatar": "https://example.com/avatar.png",
"customData": {
"preferences": {
"language": "en",
"color": "#f236c9"
}
},
"identities": {
"facebook": {
"userId": "106077000000000",
"details": {
"id": "106077000000000",
"name": "John Doe",
"email": "[email protected]",
"avatar": "https://example.com/avatar.png"
}
}
},
"lastSignInAt": 1655799453171,
"applicationId": "admin_console"
}
You can query the user profile using Logto Console or Logto Management API, such as GET /api/users/:userId
.
Basic data
Let's walk through all properties in of user's basic data.
id
id is a unique auto-generated key to identify the user in Logto.
username
username is used for sign-in with username and password.
Its value is from the username that the user first registered with. It may be null
. Its non-null value should be no longer than 128 characters, only contain letters, numbers, and underscores (_
), and NOT start with a number.
primary_email
primary_email is the user's email address, used for sign-in with the email and passcode.
Its value is usually from the email address that the user first registered with. It may be null
. Its max length is 128.
primary_phone
primary_phone is the user's phone number, used for sign-in with the phone number and passcode from SMS.
Its value is usually from the phone number that the user first registered with. It may be null
. Its non-null value should contain numbers prefixed with the country calling code (excluding the plus sign +
).
name
name is the user's full name. Its max length is 128.
avatar
avatar is the URL pointing to the user's avatar image. Its max length is 2048.
If the user registers with a social connector like Google and Facebook, its value may be retrieved from the social user info.
This property is mapped to the picture
claim in the OpenID Connect standard.
profile
profile stores additional OpenID Connect standard claims that are not included in user's properties.
Its type definition can be found at this file. Here's a copy of the type definition:
type UserProfile = Partial<{
familyName: string;
givenName: string;
middleName: string;
nickname: string;
preferredUsername: string;
profile: string;
website: string;
gender: string;
birthdate: string;
zoneinfo: string;
locale: string;
address: Partial<{
formatted: string;
streetAddress: string;
locality: string;
region: string;
postalCode: string;
country: string;
}>;
}>;
Partial
means that all properties are optional.
A difference compared to the other standard claims is that the properties in profile
will only be included in the ID token or userinfo endpoint response when their values are not empty, while other standard claims will return null
if the values are empty.
application_id
The value of application_id is from the application the user first signed in to. It may be null
.
last_signed_in_at
last_signed_in_at is the timestamp with the timezone when the user signed in last time.
password_encrypted
password_encrypted is used to store the user's encrypted password.
Its value is from the password that the user first registered with. It may be null
. If its value is non-null, its original content before encryption should be at least six characters.
password_encryption_method
password_encryption_method is used to encrypt the user's password. Its value is initialized when the user registers with the username and password. It may be null
.
Logto uses Argon2's implementation node-argon2 as the encryption method by default; see the reference for details if you're interested.
Sample a password_encrypted and password_encryption_method from a user whose password is 123456
:
{
"password_encryption_method": "Argon2i",
"password_encrypted": "$argon2i$v=19$m=4096,t=10,p=1$aZzrqpSX45DOo+9uEW6XVw$O4MdirF0mtuWWWz68eyNAt2u1FzzV3m3g00oIxmEr0U"
}
is_suspended
is_suspended is a boolean value that indicates whether a user is suspended or not. The value can be managed by calling the Logto Management API or using Admin Console.
Once a user is suspended the pre-granted refresh tokens will be revoked immediately and the user won't be able to get authenticated by Logto anymore.
Property reference
The following properties (except password_encrypted and password_encryption_method) are visible on the user profile, which means you can query them using Management API.
Name | Type | Description | Unique | Required |
---|---|---|---|---|
id | string | Unique identifier | ✅ | ✅ |
username | string | Username for sign-in | ✅ | ❌ |
primary_email | string | Primary email | ✅ | ❌ |
primary_phone | string | Primary phone number | ✅ | ❌ |
name | string | Full name | ❌ | ❌ |
avatar | string | URL pointing to user's avatar image | ❌ | ❌ |
identities | object | User info retrieved from social sign-in | ❌ | ✅ |
custom_data | object | Additional info in customizable properties | ❌ | ✅ |
application_id | string | Application ID that the user first registered | ❌ | ✅ |
last_sign_in_at | date time | Timestamp when the user signed in last time | ❌ | ✅ |
password_encrypted | string | Encrypted password | ❌ | ❌ |
password_encryption_method | string | Password encryption method | ❌ | ❌ |
is_suspended | bool | User suspend mark | ❌ | ✅ |
- Unique: Ensures the uniqueness of the values entered into a property of a database table.
- Required: Ensures that the values entered a property of a database table can NOT be
null
.
Social identities
identities contains the user info retrieved from social sign-in (i.e., sign-in with a social connector). Each user's identities is stored in an individual JSON object.
The user info varies by social identity provider (i.e., social network platform), and it typically includes the following:
- target of the identity provider, such as "facebook" or "google"
- User's unique identifier for this provider
- User's name
- User's verified email
- User's avatar
The user's account may be linked to multiple social identity providers via social sign-in; the corresponding user info retrieved from these providers will be stored in the identities object.
Sample identities from a user who signed in with both Google and Facebook:
{
"facebook": {
"userId": "5110888888888888",
"details": {
"id": "5110888888888888",
"name": "John Doe",
"email": "[email protected]",
"avatar": "https://example.com/avatar.png"
}
},
"google": {
"userId": "111000000000000000000",
"details": {
"id": "111000000000000000000",
"name": "John Doe",
"email": "[email protected]",
"avatar": "https://example.com/avatar.png"
}
}
}
Custom data
custom_data stores additional user info not listed in the pre-defined user properties.
You can use custom_data to do the following things:
- Record whether specific actions have been done by the user, such as having seen the welcome page.
- Store application-specific data in the user profile, such as the user's preferred language and appearance per application.
- Maintain other arbitrary data related to the user.
Sample custom_data from an admin user in Logto:
{
"adminConsolePreferences": {
"language": "en",
"appearanceMode": "system",
"experienceNoticeConfirmed": true
},
"customDataFoo": {
"foo": "foo"
},
"customDataBar": {
"bar": "bar"
}
}
Each user's custom_data is stored in an individual JSON object.
DO NOT put sensitive data in custom_data
You may fetch a user profile containing custom_data using Management API and send it to the frontend apps or external backend services. Therefore, putting the sensitive information in custom_data may cause data leaks.
If you still want to put the sensitive information in custom_data, we recommend encrypting it first. Only encrypt/decrypt it in a trusted party like your backend services, and avoid doing it in the frontend apps. These will minimize the loss if your users' custom_data is leaked by mistake.
You can update the user's custom_data using Admin Console or Logto Management API, such as PATCH /api/users/:userId
.
Update carefully
Updating a user's custom_data will completely overwrite its original content in the storage.
For example, if your input of calling update custom_data API looks like this (suppose that the original custom_data is previous shown sample data):
{
"customDataBaz": {
"baz": "baz"
}
}
then new custom_data value after updating should be:
{
"customDataBaz": {
"baz": "baz"
}
}
That is, the updated field value has nothing to do with the previous value.