You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Which Version of Microsoft Identity Web are you using ?
Microsoft.Identity.Web 0.1.2-preview
Where is the issue?
Web App
Sign-in users
Sign-in users and call web APIs
Web API
Protected web APIs (Validating tokens)
Protected web APIs (Validating scopes)
Protected web APIs call downstream web APIs
Token cache serialization
In Memory caches
Session caches
Distributed caches
Other? - please describe;
Is this a new or existing app?
This is a new app being built for production deployment.
Repro
I've just been asked to help an AAD B2C customer with a problem they have with logging on using AAD B2C in a dotnet core 3.1 web app they are developing.
// The AAD "iss" claims contains the tenant ID in its value. The URI is {domain}/{tid}/v2.0privatestaticstringGetTenantIdFromIss(stringiss){if(string.IsNullOrEmpty(iss)){returnstring.Empty;}varuri=newUri(iss);if(uri.Segments.Length>1){returnuri.Segments[1].TrimEnd('/');}returnstring.Empty;}
Expected behavior
I expect that since the issuer is valid, the microsoft.identity.web package would enable sign in to complete normally.
Actual behavior
An exception is thrown indicating that the token issuer is invalid
Which Version of Microsoft Identity Web are you using ?
Microsoft.Identity.Web 0.1.2-preview
Where is the issue?
Other? - please describe;
Is this a new or existing app?
This is a new app being built for production deployment.
Repro
I've just been asked to help an AAD B2C customer with a problem they have with logging on using AAD B2C in a dotnet core 3.1 web app they are developing.
Having run through their scenario in debug I have noticed that they have token compatibility set as described in https://docs.microsoft.com/en-us/azure/active-directory-b2c/tokens-overview#compatibility so that their issuer is https://xxxxxxxx.b2clogin.com/tfp/xxxxxxxx/xxxxxx_sign_up_in/v2.0/.
Looking at the source code in https://github.com/AzureAD/microsoft-identity-web/blob/master/src/Microsoft.Identity.Web/Resource/AadIssuerValidator.cs
Expected behavior
I expect that since the issuer is valid, the microsoft.identity.web package would enable sign in to complete normally.
Actual behavior
An exception is thrown indicating that the token issuer is invalid
Possible Solution
and
or perhaps something more elegant - explicitly identifying the token format in use rather than trying to guess it from its structure?
The text was updated successfully, but these errors were encountered: