Discord
- Ory Console
- Ory CLI
Follow these steps to add Discord as a social sign-in provider to your project using the Ory Console:
- 
Sign in to Ory Console and select Social Sign-in. 
- 
Click the switch next to the Discord logo to start the configuration. 
- 
Copy the Redirect URI and save it for later use. 
- 
Create a Discord OAuth2 application by clicking the New Application button. 
- 
After creating the application, navigate to the OAuth2 | General section of the registered application in Discord and copy the following data to the corresponding fields in the form in the Ory Console: - CLIENT ID
- CLIENT SECRET
 
- 
From the OAuth2 → General section in Discord, add the saved Redirect URI from Ory to the Redirects of the registered application. 
- 
In the Scopes field of the form in the Ory Console, add the following scopes: - identify
- email
 
- 
In the Data Mapping field of the form in the Ory Console, add the following Jsonnet code snippet, which maps the desired claims to the Ory Identity schema: local claims = {
 email_verified: false,
 } + std.extVar('claims');
 {
 identity: {
 traits: {
 // Allowing unverified email addresses enables account
 // enumeration attacks, if the value is used for
 // verification or as a password login identifier.
 //
 // Therefore we only return the email if it (a) exists and (b) is marked verified
 // by Discord.
 [if 'email' in claims && claims.email_verified then 'email' else null]: claims.email,
 },
 },
 }<JsonnetWarning format="Jsonnet code snippets" use="data mapping" />
- 
Click Save Configuration. 
Follow these steps to add Discord as a social sign-in provider to your project using the Ory CLI:
- 
In the created app, set the redirect URI to: https://{project.slug}.projects.oryapis.com/self-service/methods/oidc/callback/discord
- 
Create a Jsonnet code snippet to map the desired claims to the Ory Identity schema. local claims = {
 email_verified: false,
 } + std.extVar('claims');
 {
 identity: {
 traits: {
 // Allowing unverified email addresses enables account
 // enumeration attacks, if the value is used for
 // verification or as a password login identifier.
 //
 // Therefore we only return the email if it (a) exists and (b) is marked verified
 // by Discord.
 [if 'email' in claims && claims.email_verified then 'email' else null]: claims.email,
 },
 },
 }infoDiscord doesn't implement OpenID Connect. Ory makes a request to Discord's User API and adds the data to std.extVar('claims'). Not all fields are supported. Check the list of supported fields in the source code.The identifyscope adds these fields:iss # always https://discord.com/api/v6/oauth2/
 sub # numeric discord user id
 name # username + # + discriminator
 nickname # username
 preferred_username # username
 picture # avatar url
 locale # user localeThe emailscope adds these fields:email # user email
 email_verified # whether email is verified<JsonnetWarning format="Jsonnet code snippets" use="data mapping" />
- 
Encode the Jsonnet snippet with Base64 or host it under an URL accessible to Ory Network. cat your-data-mapping.jsonnet | base64
- 
Download the Ory Identities config from your project and save it to a file: ## List all available projects
 ory list projects
 ## Get config
 ory get identity-config {project-id} --format yaml > identity-config.yaml
- 
Add the social sign-in provider configuration to the downloaded config. Add the Jsonnet snippet with mappings as a Base64 string or provide an URL to the file. selfservice:
 methods:
 oidc:
 config:
 providers:
 - id: discord # this is `<provider-id>` in the Authorization callback URL. DO NOT CHANGE IT ONCE SET!
 provider: discord
 client_id: .... # Replace this with the OAuth2 Client ID provided by Discord
 client_secret: .... # Replace this with the OAuth2 Client Secret provided by Discord
 mapper_url: "base64://{YOUR_BASE64_ENCODED_JSONNET_HERE}"
 # Alternatively, use an URL:
 # mapper_url: https://storage.googleapis.com/abc-cde-prd/9cac9717f007808bf17f22ce7f4295c739604b183f05ac4afb4
 scope:
 - identify
 - email
 enabled: true
- 
Update the Ory Identities configuration using the file you worked with: ory update identity-config {project-id} --file identity-config.yaml
Troubleshooting
When you add a social sign-in provider, you can encounter common problems such as:
- Redirect URI mismatch
- Redirect loops during registration
- Domain verification issues
To troubleshoot those issues, read Social sign-in troubleshooting.