Open GKanitz opened 2 years ago
@GKanitz I am not certain that this will solve your issue, but it looks to me like your login.scopes
might be configured incorrectly as a single string, instead of a list of strings. You could try to change it to "scopes": ["openid", "profile", "email"]
and see if it helps.
We released a feature to programmatically assign roles with a function. Within the function, you have access to the token and claims from the IdP. See the documentation for more details. There's also a tutorial with a sample app.
Currently you can use this function to assign roles. If you'd like to also store claims that you can access in the /.auth/me endpoint or in the user principal in a function app, let us know.
Hi, I'm currently working on a static web-app that is providing a client and a business portal. I configured the aad auth provider with the B2B active directory tenant details and added a custom open-id connect provider with the B2C tenant details.
As the JWT tokens do not exposed I wanted to understand how I can receive additional details for the loggedin user like i.e. organization details or name, last name and email from the graph API?
This is the configuration that I'm currently using