Closed sayu-agiliad closed 9 months ago
Closing this issue, as it was solved and was due to an incorrect configuration. For anyone reaching this result via a google search, the issue was that we had not correctly added "openid" in the scope parameter while configuring the ID Provider, and the different scopes needed to be space delimited.
Hello, I am creating a federated authentication for my SAAS app. I have setup a b2c tenant for each customer organization. I add these B2Cs instances as openid provider in a separate master B2C tenant which does not have any local account. The way it is supposed to work is that I have separate user flows for each customer in my master b2c tenant which in turns uses the respective b2c tenant for the authentication flows. I am relying on the "Identity Provider Access Token" claim to get the access token issued by the B2C tenant. However, after authentication, I am not getting this claim. If I add a microsoft account as the ID provider, it works as expected. However, my requirement is to make this work with a B2C tenant per customer. Any help is appreiciated.