Managing external identities to enable secure access for partners, customers, and other non-employees
We encountered this issue and found it was due to a Private Endpoint Connection on the Storage Account hosting our static content.
An nslookup on our Storage Account URI resolved two aliases:
Aliases: xxxxx.blob.core.windows.net
xxxxx.privatelink.blob.core.windows.net
If someone tried to load our login page from a network with its own Azure privatelink resolver, their browser would attempt to load our content from their own tenant.
We resolved this by deleting the private endpoint connection (found under Security + Networking > Networking > Private Endpoint Connections in the Storage Account Console). This immediately stopped the ClientCrossOriginException messages. If you need the private endpoint, make sure the privatelink alias doesn't appear in DNS outside your network.