Metadata Field Names and Data Types

Metadata Field Names and Data Types

Auth0 distinguishes between three types of metadata used to store specific kinds of information.

Metadata Type Field Name Description
User Information user_metadata Stores user attributes such as preferences that do not impact a user's core functionality. This data can be edited by logged in users if you build a form using the Management API and should not be used as a secure data store.
Access Information app_metadata Stores information such as permissions, Auth0 plan, and external IDs that can impact user access to features. This data cannot be edited by users and there are restrictions for what can be stored in this field.
Application Information client_metadata in the Client object, context.clientMetadata in Rules, and event.client.metadata in post-login Actions. Stores information about an application (or client in OIDC OAuth2 terminology). For example, the URL for the application home page (any value that Auth0 doesn’t set in the application settings).

Metadata field names

Accepted characters

Field names must not contain the . (dot) or $ (dollar sign) characters.

For example, this is not allowed:

{
  "preference.color": "pink"
}

Was this helpful?

/

But you can expand it like this:

{
    "preference": { 
        "color": "pink" 
    }
}

Was this helpful?

/

Dynamic field names

Field names should be static. Dynamic field names reduce indexing efficiency and cause degradation in search queries. A static schema is easier to search, manipulate, and work with.

Instead of doing this:

{
    "participants": [
        "Alice": {
            "role": "sender"
         },
        "Bob": {
            "role": "receiver"
        }
    ]
}

Was this helpful?

/

Do this:

{
    "participants": [
        {
            "name": "Alice",
            "role": "sender"
        },
        {
            "name" : "Bob",
            "role": "receiver"
        }
    ]
}

Was this helpful?

/

Name collision

Avoid using the same name for app_metadata fields and root profile fields. Within the Rules scope, app_metadata fields are merged onto the root profile and may override root profile fields.

For example, if a user has a groups field present on their root profile (returned from a SAML identity provider) and a groups field within app_metadata, their profile might look like this:

{
    "user_id": "samlp|example-samlp-connection|username@domain.com",
    "groups": [
        "external-group-1",
        "external-group-2"
    ],
    "app_metadata": {
        "groups": [
            "internal-group-1",
            "internal-group-2"
        ]
    }
}

Was this helpful?

/

When you read the groups field on the User object from a Rule, it will return: ["internal-group-1", "internal-group-2"].

Metadata data types

Metadata fields support all JSON-compatible data types:

  • String

  • Number

  • Array

  • Object

Make sure to keep data types consistent between users. For example, if you store a value as a string for one user (user.user_metadata.age = "23") and as a number for another user (user.user_metadata.age = 23), you may encounter issues when retrieving the data.

Limitations and restrictions

Rate limits

When you update metadata during login with Rules or Actions, you are subject to your tenant’s rate limits. To learn more, read Management API Endpoint Rate Limits.

Size limits and storage

  • The app_metadata and user_metadata fields have a combined maximum limit of 16 MB total per user. There is no limit to the number of properties that may be stored in these fields.

  • When you set the user_metadata field using the Auth0 Authentication API Signup endpoint, you can include a maximum of 10 string fields whose values do not exceed 500 characters each. For an example of working with metadata during a custom signup process, read Custom Signup.

  • The client_metadata field can have a maximum of 10 keys. Its keys and values have a maximum length of 255 characters each and cannot contain UTF-8 special characters.

Restrictions

The app_metadata field must not contain any of these properties:

  • __tenant

  • _id

  • blocked

  • clientID

  • created_at

  • email_verified

  • email

  • globalClientID

  • global_client_id

  • identities

  • lastIP

  • lastLogin

  • loginsCount

  • metadata

  • multifactor_last_modified

  • multifactor

  • updated_at

  • user_id

Learn more