A cloud-based identity and access management service for securing user authentication and resource access
Hi @Kevin Dule,I appreciate your effort in resolving the issue. I am posting your solution here which helps other community members in future.
Resolved Issue: by @Kevin Dule,
To enable successful authentication using Azure AD as an identity provider in Keycloak, the following changes were made:
Scopes Configuration: In the Keycloak identity provider settings, the input for Scopes was updated to include openid email profile to ensure the ID token contains the necessary user claims.
Client ID Inclusion: Additionally, the Azure AD Application (Client) ID was appended to the scope input field in Keycloak (e.g., openid email profile <client-id>), as required by Azure AD for certain resource access scenarios.
These changes allowed Keycloak to correctly receive user information from Azure AD during the authentication flow.
Kindly click on "Accept Answer" and "upvote it" which will be displayed as an answer the thread resolved by you.