diff --git a/step-ca/provisioners.mdx b/step-ca/provisioners.mdx
index 343f48d2..731959a1 100644
--- a/step-ca/provisioners.mdx
+++ b/step-ca/provisioners.mdx
@@ -1,5 +1,5 @@
---
-updated_at: March 27, 2025
+updated_at: June 17, 2025
title: Configuring `step-ca` Provisioners
html_title: Configuring open source step-ca Provisioners
description: Learn how to configure step-ca Provisioners
@@ -645,6 +645,7 @@ Example `ca.json` provisioner configuration for a Google provisioner:
"configurationEndpoint": "https://accounts.google.com/.well-known/openid-configuration",
"admins": ["you@smallstep.com"],
"domains": ["smallstep.com"],
+ "scopes": ["openid", "email"],
"listenAddress": ":10000",
"claims": {
"maxTLSCertDuration": "8h",
@@ -676,6 +677,8 @@ Example `ca.json` provisioner configuration for a Google provisioner:
- **domains**: is the list of domains valid. If provided only the emails with the provided domains will be able to authenticate.
+- **scopes**: a list of scopes OAuth clients should request. This is used by the `step` CLI. The default value is `["openid","email"]`.
+
- **listenAddress**: is the address (`:port` or `host:port`) where the authorization server will redirect the client's web browser at the end of the authorization flow. By default, the `step` client will bind to 127.0.0.1 on a random port. This parameter is only required if the authorization server demands a specific port for loopback IP redirect URIs.
- **claims**: overwrites the default claims set in the authority,