This section covers the scopes that can be used to extend different OAuthenticators. By overriding the scope list in the authenticator, additional features can be enabled for specific deployment needs.