Thank you for posting this in Microsoft Q&A.
I understand you want to get an access token with all your scopes in it.
These scopes openid,email,offline_access,profile user.read under Microsoft Graph API and API one api://[myapi]/Domino.user.all is Application scope.
It is not possible to include scopes for different resources in the same Azure AD access token request because access tokens are issued based on API audiences, one token cannot have multiple API audiences, you need to obtain separate access token for different types of scopes.
For more information, please refer this document: https://learn.microsoft.com/en-us/entra/identity-platform/scopes-oidc#openid-connect-scopes
Hope this helps. Do let us know if you any further queries.
Please "Accept the answer" if the information helped you. This will help us and others in the community as well.