-
Notifications
You must be signed in to change notification settings - Fork 406
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Document Azure "{tenantid}" discovery quirks #212
Comments
To be clear, if we see an issuer URL returned like
|
As far as I know, the URL I'm providing is correct. These are the endpoints given to me in Azure page where I register my "app" to get the client id and secret. Note the word Also see this documentation:
They're breaking the spec on purpose or have a bug. If it is indeed a bug, I don't know where to open issue to actually get it fixed. |
Ah thanks for the follow up. Yeah it looks like its broken on their end. I'd strongly recommend opening an issue with Microsoft https://github.com/MicrosoftDocs/azure-docs/issues?utf8=%E2%9C%93&q=%22524b460d-47b7-72c9-e994-ea94b3a9dd2b%22&in=body Out of curiosity, what's the "iss" claim of the ID Token? |
Managed to get it working as per #121 (comment). This still obviously it is non-standard implementation on Microsofts side. At the same time I believe the error message should explain that instead of using:
one should use:
Sadly that's not mentioned anywhere in MS docs. And doing another Google search, now I'm not even sure that using Edit: Edit 2: |
Thanks for the update! It sounds like there's still some confusion around what the correct URL to use for Azure is. Going to see how https://github.com/MicrosoftDocs/azure-docs/issues/38427 plays out before taking action here. On a different note, I think this demonstrates why the inability to skip issuer validation is good. I'd rather users understand the correct solution, instead of choosing the easy option to insecurely skip validation and continue with an incorrect setup. |
The same problem occurs in 'organizations' and no aliases like 'common' are found. |
Yeah it sounds like they aren't going to make it spec compliant https://github.com/MicrosoftDocs/azure-docs/issues/38427#issuecomment-555855086 @yacchi you can do discovery yourself and build a verifier with: https://godoc.org/github.com/coreos/go-oidc#NewRemoteKeySet |
Thanks. It would be very useful to be able to use provider as well, but is it difficult? |
Creating a Provider requires a spec compliant OpenID Connect issuer. So no, you can't create on with certain Azure setups. |
fix issue with {tenantid} coreos/go-oidc#212
This has become such a common question that I think it's worth documenting or having a special error message.
#121
#159
#204
The text was updated successfully, but these errors were encountered: