Hi @Anand Patil ,
Thank you for reaching out.
In reference to our previous discussion (https://learn.microsoft.com/en-us/answers/questions/1792571/azure-ad-b2c-custom-policy-as-a-federated-identity), you were able to resolve the 400 Bad Request error by making the necessary configuration adjustments.
At that time, the only variation in the configuration was that you were using https://jwt.ms as the Allowed Callback URL.
The new callback URL should not impact the authentication process. However
1.Ensure that the Redirect URI in Azure AD B2C (configured in your custom policy) exactly matches the Cognito callback URL: https://myuserpool.auth.ap-south-1.amazoncognito.com/oauth2/idpresponse
.
- Ensure that the Allowed Callback URL in AWS Cognito matches the URL of your CloudFront distribution where the app is hosted:
https://mycloudfronturl.cloudfront.net/redirectapp
.
Sometimes, even small differences in case, trailing slashes, or URL encoding can lead to mismatches. Double-check that they match exactly.
Could you also confirm if the setup is still working with jwt.ms and only encountering errors with the CloudFront URL?
Hope this will help.
Thanks,
Shweta