Im using python social auth library with Azure AD authentication.
I tried with "AzureADTenantOAuth2" and "AzureADOAuth2", after login and redirect back to application. Then I tried to put returned user id token to jwt.io, but the "id_token" of user doesnt contains "scope" and "roles".
From the application, the "SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_SCOPE" / "SOCIAL_AUTH_AZUREAD_OAUTH2_SCOPE" replaced by [xxxxxxxx/user_impersonation', 'openid', 'profile', 'offline_access'].
What are the steps to reproduce this issue?
Input clear steps to reproduce the issue for a maintainer.
use AzureADTenantOAuth2 / AzureADOAuth2
add required argument in settings.py e.g. "SOCIAL_AUTH_AZUREAD_OAUTH2_KEY"
do azure AD oauth2 authentication and redirect back to application
check returned user id token (doesnt contain scp and roles)
Expected behaviour
Roles and scope should in returned id_token.
Actual behaviour
Im using python social auth library with Azure AD authentication.
I tried with "AzureADTenantOAuth2" and "AzureADOAuth2", after login and redirect back to application. Then I tried to put returned user id token to jwt.io, but the "id_token" of user doesnt contains "scope" and "roles".
From the application, the "SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_SCOPE" / "SOCIAL_AUTH_AZUREAD_OAUTH2_SCOPE" replaced by [xxxxxxxx/user_impersonation', 'openid', 'profile', 'offline_access'].
What are the steps to reproduce this issue?
Input clear steps to reproduce the issue for a maintainer.
Any logs, error output, etc?
No error, the code running fine, but token wasnt.