Thank you for posting your query on Microsoft Q&A, from above description I could understand that you had "https://login.microsoftonline.com/{tenant_id}/v2.0 configured as well known open ID issuer however the actual access token is coming from https://{tenantname}.ciamlogin.com/{tenantid}/v2.0.ciam.
Please do correct me if this is the case by responding in the comments.
As per Token endpoints and issuers
Microsoft Entra ID workforce tenants authenticate at login.microsoftonline.com with tokens issued by sts.windows.net. Workforce tenant tokens are generally interchangeable across tenants and multi-tenant applications so long as underlying trust relationships permit this interoperability. Microsoft Entra ID customer tenants use tenanted endpoints of the form {tenantname}.ciamlogin.com. Applications registered to customer tenants must be aware of this separation to receive and validate tokens correctly. Every Microsoft Entra ID tenant publishes a standards-compliant well-known metadata. This document contains information about the issuer name, the authentication and authorization endpoints, supported scopes and claims. For customer tenants, the document is publicly available at: https://{tenantname}.ciamlogin.com/{tenantid}/v2.0/.well-known/openid-configuration. This endpoint returns an issuer value https://{tenantname}.ciamlogin.com/{tenantid}/v2.0.ciam.
So, the suggestion here would be to have your application configured for authority as:
"Authority": "https://Enter_the_Tenant_Subdomain_Here.ciamlogin.com/",
Thanks,
Akshay Kaushik
Please "Accept the answer (Yes)" and "share your feedback ". This will help us and others in the community as well.