azure-ad-b2c / samples

Azure AD B2C custom policy solutions and samples.
846 stars 598 forks source link

Application claim "Identity Provider Access Token" not received #599

Closed sayu-agiliad closed 9 months ago

sayu-agiliad commented 11 months ago

Hello, I am creating a federated authentication for my SAAS app. I have setup a b2c tenant for each customer organization. I add these B2Cs instances as openid provider in a separate master B2C tenant which does not have any local account. The way it is supposed to work is that I have separate user flows for each customer in my master b2c tenant which in turns uses the respective b2c tenant for the authentication flows. I am relying on the "Identity Provider Access Token" claim to get the access token issued by the B2C tenant. However, after authentication, I am not getting this claim. If I add a microsoft account as the ID provider, it works as expected. However, my requirement is to make this work with a B2C tenant per customer. Any help is appreiciated.

sayu-agiliad commented 9 months ago

Closing this issue, as it was solved and was due to an incorrect configuration. For anyone reaching this result via a google search, the issue was that we had not correctly added "openid" in the scope parameter while configuring the ID Provider, and the different scopes needed to be space delimited.