Mapping rules for OAuth and OIDC

Security Verify Access provides default mapping rules that you can use and customize for your OAuth or OIDC deployment.