Azure B2B - authorization code variable length for Google.com federated auth

MSG160 111 Reputation points
2021-11-04T13:50:35.173+00:00

Hi,

We are using Azure B2B external identities to allow access to partners to an internal application that supports OAUTH2+OpenID Connect. We are seeing variances in the authorization code sent back to the redirect URI of our app when using B2B - this seems to be when using Google.com for signing in to B2B. Guest accounts can sign up using Google.com as a provider. The internal app (its a third party app) seems to have a limit in the length of the authorization code it accepts.

In most cases this hasn't been an issue. We are usually getting back an authorization code of around 1860 chars, plus state and session_state params of 36 chars each (guid). However, with certain Google.com accounts, the authorization code passed to the redirect URI is 1966 chars and causes an issue with our internal app.

I just wanted to understand why there could be variations in length of the authorization code passed to the redirect_uri of our app for some google.com federated domains and not others. I assumed there would be some consistency in the length of the code being passed in by B2B when sign-in is completed.

I can't seem to find any documentation around this.

Thanks

Microsoft Entra External ID
Microsoft Entra External ID
A modern identity solution for securing access to customer, citizen and partner-facing apps and services. It is the converged platform of Azure AD External Identities B2B and B2C. Replaces Azure Active Directory External Identities.
2,633 questions
0 comments No comments
{count} votes