Hello @Maxime D
I Understand that you are trying to pass the refresh token with IDP access token using azure AD B2C To connect via SSO with an Azure Entra IDP. You’ve followed the recommended procedure, but the refresh token isn’t being returned, and there are no errors in the logs.To ensure that the refresh token is correctly returned in your Azure AD B2C custom policy, you need to verify that the <IncludeInSso>
element is set to True
within your technical profiles. By default, this is usually set to True
, but if it's set to False
, it can affect the issuance of the refresh token, as the token may not be included in the session.
Example:
<TechnicalProfile Id="AAD-Common">
<DisplayName>Azure Active Directory</DisplayName>
<Protocol Name="Proprietary" Handler="Web.TPEngine.Providers.AzureActiveDirectoryProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" />
<CryptographicKeys>
<Key Id="issuer_secret" StorageReferenceId="B2C_1A_TokenSigningKeyContainer" />
</CryptographicKeys>
<!-- We need this here to suppress the SelfAsserted provider from invoking SSO on validation profiles. -->
<IncludeInSso>false</IncludeInSso>
<UseTechnicalProfileForSessionManagement ReferenceId="SM-Noop" />
</TechnicalProfile>
Refer this document: https://learn.microsoft.com/en-us/azure/active-directory-b2c/active-directory-technical-profile#protocol
When a technical profile doesn't reference any session management provider, the DefaultSSOSessionProvider session provider is applied, which may cause unexpected behavior.
Hope this helps if you are still facing the issue let us know. Happy to help.