Hi ii42-8206,
You cannot use RBAC out-of-the-box with Azure AD B2C. The roles would need to be assigned within the B2C's AAD directory or hosted externally and retrieved via Graph API, or if you are using ROPC you would still have to make a call to the underlying AAD and only Microsoft accounts (and not social identities) would be supported. Azure AD B2C does not support out-of-box support for role claims for consumer accounts as it would not be feasible for the admin to assign the role to consumer identities.
You can use custom claims in to allow consumers to select the required role during the signup process which is returned in the token as well. https://learn.microsoft.com/en-us/aspnet/core/security/authentication/claims?view=aspnetcore-7.0
You could also leverage Custom Policies, which allow you to call a REST API during authentication. This can be used to pass the ObjectId of the user to your API and return the roles to Azure AD B2C. B2C can then issue the roles as a claim into the token.
2.You can revoke refresh tokens by these methods:
- Using Graph API. Notice that the method is called “
invalidateAllRefreshTokens".
- Via a custom policy
- Via PowerShell
I'm not sure I fully understand your question about client ID, so feel free to clarify. But this parameter applies not only to Microsoft but is used by other identitiy providers too. For example, an id_token
value received from Google would need match the value of the --oidc-client-id
parameter.
Let me know if this helps at all and if you have further questions.