diff --git a/src/Client/Messages/TokenIntrospectionResponse.cs b/src/Client/Messages/TokenIntrospectionResponse.cs
index 17408201..d539e4f8 100644
--- a/src/Client/Messages/TokenIntrospectionResponse.cs
+++ b/src/Client/Messages/TokenIntrospectionResponse.cs
@@ -3,6 +3,7 @@
 
 using System;
 using System.Collections.Generic;
+using System.Globalization;
 using System.Linq;
 using System.Security.Claims;
 using System.Text.Json;
@@ -11,11 +12,50 @@
 namespace IdentityModel.Client;
 
 /// <summary>
-/// Models an OAuth 2.0 introspection response
+/// Models an OAuth 2.0 introspection response as defined by <a href="https://datatracker.ietf.org/doc/html/rfc7662">RFC 7662 - OAuth 2.0 Token Introspection</a>
 /// </summary>
 /// <seealso cref="IdentityModel.Client.ProtocolResponse" />
 public class TokenIntrospectionResponse : ProtocolResponse
 {
+    private readonly Lazy<string[]> _scopes;
+    private readonly Lazy<string?> _clientId;
+    private readonly Lazy<string?> _userName;
+    private readonly Lazy<string?> _tokenType;
+    private readonly Lazy<DateTimeOffset?> _expiration;
+    private readonly Lazy<DateTimeOffset?> _issuedAt;
+    private readonly Lazy<DateTimeOffset?> _notBefore;
+    private readonly Lazy<string?> _subject;
+    private readonly Lazy<string[]> _audiences;
+    private readonly Lazy<string?> _issuer;
+    private readonly Lazy<string?> _jwtId;
+
+    /// <summary>
+    /// Initializes a new instance of the <see cref="TokenIntrospectionResponse"/> class.
+    /// </summary>
+    public TokenIntrospectionResponse()
+    {
+        _scopes = new Lazy<string[]>(() => Claims.Where(c => c.Type == JwtClaimTypes.Scope).Select(c => c.Value).ToArray());
+        _clientId = new Lazy<string?>(() => Claims.FirstOrDefault(c => c.Type == JwtClaimTypes.ClientId)?.Value);
+        _userName = new Lazy<string?>(() => Claims.FirstOrDefault(c => c.Type == "username")?.Value);
+        _tokenType = new Lazy<string?>(() => Claims.FirstOrDefault(c => c.Type == "token_type")?.Value);
+        _expiration = new Lazy<DateTimeOffset?>(() => GetTime(JwtClaimTypes.Expiration));
+        _issuedAt = new Lazy<DateTimeOffset?>(() => GetTime(JwtClaimTypes.IssuedAt));
+        _notBefore = new Lazy<DateTimeOffset?>(() => GetTime(JwtClaimTypes.NotBefore));
+        _subject = new Lazy<string?>(() => Claims.FirstOrDefault(c => c.Type == JwtClaimTypes.Subject)?.Value);
+        _audiences = new Lazy<string[]>(() => Claims.Where(c => c.Type == JwtClaimTypes.Audience).Select(c => c.Value).ToArray());
+        _issuer = new Lazy<string?>(() => Claims.FirstOrDefault(c => c.Type == JwtClaimTypes.Issuer)?.Value);
+        _jwtId = new Lazy<string?>(() => Claims.FirstOrDefault(c => c.Type == JwtClaimTypes.JwtId)?.Value);
+    }
+
+    private DateTimeOffset? GetTime(string claimType)
+    {
+        var claimValue = Claims.FirstOrDefault(e => e.Type == claimType)?.Value;
+        if (claimValue == null) return null;
+
+        var seconds = long.Parse(claimValue, NumberStyles.AllowLeadingSign, NumberFormatInfo.InvariantInfo);
+        return DateTimeOffset.FromUnixTimeSeconds(seconds);
+    }
+
     /// <summary>
     /// Allows to initialize instance specific data.
     /// </summary>
@@ -73,6 +113,94 @@ protected override Task InitializeAsync(object? initializationData = null)
     /// </value>
     public bool IsActive => Json?.TryGetBoolean("active") ?? false;
 
+    /// <summary>
+    /// Gets the list of scopes associated to the token.
+    /// </summary>
+    /// <value>
+    /// The list of scopes associated to the token or an empty array if no <c>scope</c> claim is present.
+    /// </value>
+    public string[] Scopes => _scopes.Value;
+
+    /// <summary>
+    /// Gets the client identifier for the OAuth 2.0 client that requested the token.
+    /// </summary>
+    /// <value>
+    /// The client identifier for the OAuth 2.0 client that requested the token or null if the <c>client_id</c> claim is missing.
+    /// </value>
+    public string? ClientId => _clientId.Value;
+
+    /// <summary>
+    /// Gets the human-readable identifier for the resource owner who authorized the token.
+    /// </summary>
+    /// <value>
+    /// The human-readable identifier for the resource owner who authorized the token or null if the <c>username</c> claim is missing.
+    /// </value>
+    public string? UserName => _userName.Value;
+
+    /// <summary>
+    /// Gets the type of the token as defined in <a href="https://datatracker.ietf.org/doc/html/rfc6749#section-5.1">section 5.1 of OAuth 2.0 (RFC6749)</a>.
+    /// </summary>
+    /// <value>
+    /// The type of the token as defined in <a href="https://datatracker.ietf.org/doc/html/rfc6749#section-5.1">section 5.1 of OAuth 2.0 (RFC6749)</a> or null if the <c>token_type</c> claim is missing.
+    /// </value>
+    public string? TokenType => _tokenType.Value;
+
+    /// <summary>
+    /// Gets the time on or after which the token must not be accepted for processing.
+    /// </summary>
+    /// <value>
+    /// The expiration time of the token or null if the <c>exp</c> claim is missing.
+    /// </value>
+    public DateTimeOffset? Expiration => _expiration.Value;
+
+    /// <summary>
+    /// Gets the time when the token was issued.
+    /// </summary>
+    /// <value>
+    /// The issuance time of the token or null if the <c>iat</c> claim is missing.
+    /// </value>
+    public DateTimeOffset? IssuedAt => _issuedAt.Value;
+
+    /// <summary>
+    /// Gets the time before which the token must not be accepted for processing.
+    /// </summary>
+    /// <value>
+    /// The validity start time of the token or null if the <c>nbf</c> claim is missing.
+    /// </value>
+    public DateTimeOffset? NotBefore => _notBefore.Value;
+
+    /// <summary>
+    /// Gets the subject of the token. Usually a machine-readable identifier of the resource owner who authorized the token.
+    /// </summary>
+    /// <value>
+    /// The subject of the token or null if the <c>sub</c> claim is missing.
+    /// </value>
+    public string? Subject => _subject.Value;
+
+    /// <summary>
+    /// Gets the service-specific list of string identifiers representing the intended audience for the token.
+    /// </summary>
+    /// <value>
+    /// The service-specific list of string identifiers representing the intended audience for the token or an empty array if no <c>aud</c> claim is present.
+    /// </value>
+    public string[] Audiences => _audiences.Value;
+
+    /// <summary>
+    /// Gets the string representing the issuer of the token.
+    /// </summary>
+    /// <value>
+    /// The string representing the issuer of the token or null if the <c>iss</c> claim is missing.
+    /// </value>
+    public string? Issuer => _issuer.Value;
+
+    /// <summary>
+    /// Gets the string identifier for the token.
+    /// </summary>
+    /// <value>
+    /// The string identifier for the token or null if the <c>jti</c> claim is missing.
+    /// </value>
+    public string? JwtId => _jwtId.Value;
+
     /// <summary>
     /// Gets the claims.
     /// </summary>
diff --git a/test/UnitTests/HttpClientExtensions/TokenIntrospectionTests.cs b/test/UnitTests/HttpClientExtensions/TokenIntrospectionTests.cs
index cf8aa6a7..95d84d8e 100644
--- a/test/UnitTests/HttpClientExtensions/TokenIntrospectionTests.cs
+++ b/test/UnitTests/HttpClientExtensions/TokenIntrospectionTests.cs
@@ -11,6 +11,7 @@
 using System.Security.Claims;
 using System.Text.Json;
 using System.Threading.Tasks;
+using FluentAssertions.Extensions;
 using Xunit;
 
 namespace IdentityModel.UnitTests
@@ -88,6 +89,16 @@ public async Task Success_protocol_response_should_be_handled_correctly()
                 new Claim("scope", "api1", ClaimValueTypes.String, "https://idsvr4"),
                 new Claim("scope", "api2", ClaimValueTypes.String, "https://idsvr4"),
             });
+            response.Scopes.Should().BeEquivalentTo("api1", "api2");
+            response.ClientId.Should().Be("client");
+            response.UserName.Should().BeNull();
+            response.IssuedAt.Should().BeNull();
+            response.NotBefore.Should().Be(7.October(2016).At(7, 21, 11).WithOffset(0.Hours()));
+            response.Expiration.Should().Be(7.October(2016).At(8, 21, 11).WithOffset(0.Hours()));
+            response.Subject.Should().Be("1");
+            response.Audiences.Should().BeEquivalentTo("https://idsvr4/resources", "api1");
+            response.Issuer.Should().Be("https://idsvr4");
+            response.JwtId.Should().BeNull();
         }
 
         [Fact]
@@ -125,6 +136,16 @@ public async Task Success_protocol_response_without_issuer_should_be_handled_cor
                 new Claim("scope", "api1", ClaimValueTypes.String, "LOCAL AUTHORITY"),
                 new Claim("scope", "api2", ClaimValueTypes.String, "LOCAL AUTHORITY"),
             });
+            response.Scopes.Should().BeEquivalentTo("api1", "api2");
+            response.ClientId.Should().Be("client");
+            response.UserName.Should().BeNull();
+            response.IssuedAt.Should().BeNull();
+            response.NotBefore.Should().Be(7.October(2016).At(7, 21, 11).WithOffset(0.Hours()));
+            response.Expiration.Should().Be(7.October(2016).At(8, 21, 11).WithOffset(0.Hours()));
+            response.Subject.Should().Be("1");
+            response.Audiences.Should().BeEquivalentTo("https://idsvr4/resources", "api1");
+            response.Issuer.Should().BeNull();
+            response.JwtId.Should().BeNull();
         }
 
         [Fact]
@@ -165,6 +186,16 @@ public async Task Repeating_a_request_should_succeed()
                 new Claim("scope", "api1", ClaimValueTypes.String, "https://idsvr4"),
                 new Claim("scope", "api2", ClaimValueTypes.String, "https://idsvr4"),
             });
+            response.Scopes.Should().BeEquivalentTo("api1", "api2");
+            response.ClientId.Should().Be("client");
+            response.UserName.Should().BeNull();
+            response.IssuedAt.Should().BeNull();
+            response.NotBefore.Should().Be(7.October(2016).At(7, 21, 11).WithOffset(0.Hours()));
+            response.Expiration.Should().Be(7.October(2016).At(8, 21, 11).WithOffset(0.Hours()));
+            response.Subject.Should().Be("1");
+            response.Audiences.Should().BeEquivalentTo("https://idsvr4/resources", "api1");
+            response.Issuer.Should().Be("https://idsvr4");
+            response.JwtId.Should().BeNull();
 
             // repeat
             response = await client.IntrospectTokenAsync(request);
@@ -189,6 +220,16 @@ public async Task Repeating_a_request_should_succeed()
                 new Claim("scope", "api1", ClaimValueTypes.String, "https://idsvr4"),
                 new Claim("scope", "api2", ClaimValueTypes.String, "https://idsvr4"),
             });
+            response.Scopes.Should().BeEquivalentTo("api1", "api2");
+            response.ClientId.Should().Be("client");
+            response.UserName.Should().BeNull();
+            response.IssuedAt.Should().BeNull();
+            response.NotBefore.Should().Be(7.October(2016).At(7, 21, 11).WithOffset(0.Hours()));
+            response.Expiration.Should().Be(7.October(2016).At(8, 21, 11).WithOffset(0.Hours()));
+            response.Subject.Should().Be("1");
+            response.Audiences.Should().BeEquivalentTo("https://idsvr4/resources", "api1");
+            response.Issuer.Should().Be("https://idsvr4");
+            response.JwtId.Should().BeNull();
         }
 
         [Fact]
@@ -296,6 +337,16 @@ public async Task Legacy_protocol_response_should_be_handled_correctly()
                 new Claim("scope", "api1", ClaimValueTypes.String, "https://idsvr4"),
                 new Claim("scope", "api2", ClaimValueTypes.String, "https://idsvr4"),
             });
+            response.Scopes.Should().BeEquivalentTo("api1", "api2");
+            response.ClientId.Should().Be("client");
+            response.UserName.Should().BeNull();
+            response.IssuedAt.Should().BeNull();
+            response.NotBefore.Should().Be(7.October(2016).At(7, 21, 11).WithOffset(0.Hours()));
+            response.Expiration.Should().Be(7.October(2016).At(8, 21, 11).WithOffset(0.Hours()));
+            response.Subject.Should().Be("1");
+            response.Audiences.Should().BeEquivalentTo("https://idsvr4/resources", "api1");
+            response.Issuer.Should().Be("https://idsvr4");
+            response.JwtId.Should().BeNull();
         }
 
         [Fact]