-
Notifications
You must be signed in to change notification settings - Fork 161
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Issues with handling the azure B2C user flows #188
Comments
That is a bug. Will look into it. |
The pull request is still pending approval does it need anything else to be worked on? so this can take the next step |
@tikurahul curious if you will have time soon to review this PR as I also have a project that is dependent on this being merged and resolved. Thanks! |
Since this isn't merged in yet, as a workaround I was able to get past this by creating a custom Requestor which just adds the needed query param:
|
Outside of the underlying issue involving the interpretation of querystring parameters, I wanted to point out that the Azure AD B2C policy name does not have to be included as a querystring parameter for the OpenID Connect discovery document. The B2C policy name can be included as a path segment in the url which negates the need for a querystring parameter. Example:
|
Sure, but some configurations inside enterprises flow cant be changed for some reason (bureaucracy or legacy) that are available inside azure b2c, therefore the need for this change. Is not like maintaining an old way of doing this, but unless Azure removes completely this option it should be able to handle them as mentioned in the request and MR |
Expected Behavior
Let the user handle the query params that are inside the Url for configuration discovery with attached query params
[REQUIRED] Describe expected behavior
Given an URL with a query params (ex. https://login.microsofonline.com/{tenant}/v2.0?p=B2C_1_nfwSignIn) make the URL formulated to construct a valid URL (ex. https://login.microsofonline.com/{tenant}/v2.0/.well-known/openid-configuration?p=B2C_1_nfwSignIn)
Describe the problem
The Issue comes when you pass the URL as stated above the formulated URL is not a valid one given the concatenation that occurs on the file
authorization_service_configuration.ts
Also see this reference from Azure documentation
[REQUIRED] Actual Behavior
On function
fetchFromIssuer
Input
https://login.microsofonline.com/{tenant}/v2.0?p=B2C_1_nfwSignIn
Returns
https://login.microsofonline.com/{tenant}/v2.0?p=B2C_1_nfwSignIn/.well-known/openid-configuration
[REQUIRED] Steps to reproduce the behavior
Just place the URL
https://login.microsofonline.com/{tenant}/v2.0?p=B2C_1_nfwSignIn
in thefetchFromIssuer
function, I'm using a 3rd party plugin that has a dependency on this repo ionic-appauth[REQUIRED] Environment
This code resolves my issue but I'm not sure how to make a pull request
The text was updated successfully, but these errors were encountered: