Web App Easy Auth with OIDC Provider: Difference between Windows and Linux

Kentaro Inomata 31 Reputation points
2022-02-14T01:55:51.63+00:00

I am configuring Easy Auth with OIDC Provider on Web App Linux, and on Web App Windows for comparison.

As far as I understand, there is no way to specify the scopes.
173859-image.png

When Linux, it doesn't work well.
Specifically, When I access the linux web site, Easy Auth returns HTTP 302 as below.

HTTP/1.1 302 Found  
Location: https://kinomata1bc2.b2clogin.com/kinomata1bc2.onmicrosoft.com/b2c_1_singup_signin/oauth2/v2.0/authorize?response_type=code&client_id=83635a3e-ca10-4e24-95ba-05873ea8e327&redirect_uri=https%3A%2F%2Fmsdn-kinomata1-linux.azurewebsites.net%2F.auth%2Flogin%2Faadb2c%2Fcallback&nonce=d4d3551f04654fcfa62a5ee18686b1d8_20220214015424&state=%2F  
  

Then an OIDC provider refuses the access for the lack of a scope parameter.

{"code":401,"message":"An error of type 'invalid_request' occurred during the login process: 'AADB2C90010: The request does not contain a scope parameter.\r\nCorrelation ID: 2833db73-795f-4447-b9a2-bdcff752df90\r\nTimestamp: 2022-02-14 01:49:26Z\r\n'"}  

When Windows, it works as expected.

HTTP/1.1 302 Redirect  
Location: https://kinomata1bc2.b2clogin.com/kinomata1bc2.onmicrosoft.com/b2c_1_singup_signin/oauth2/v2.0/authorize?response_type=code&client_id=f182113d-65a6-431e-bda4-8c53136a59b8&redirect_uri=https%3A%2F%2Fmsdn-kinomata1-windows.azurewebsites.net%2F.auth%2Flogin%2Faadb2c%2Fcallback&nonce=c6de6dd3a0ed4a0eaf4d3c4f1b25417e_20220214015834&state=redir%3D%252F&scope=openid+profile+email  
  
Azure App Service
Azure App Service
Azure App Service is a service used to create and deploy scalable, mission-critical web apps.
8,934 questions
{count} votes

Accepted answer
  1. ajkuma 28,036 Reputation points Microsoft Employee Moderator
    2022-02-15T12:39:56.827+00:00

    KentaroInomata-4553, Thanks for the follow-up and sharing additional info.

    I had a discussion on this internally. This was due to a bug; the fix has been rolled out. The latest platform upgrade that should be completed in the coming weeks should bring the new version of EasyAuth middleware with the fix.

    The fix adds the ‘openid,’ ‘profile,’ and ‘email’ scopes by default if none is provided in the application. The workaround (manually adding these scopes) is a suitable workaround (at this time).

    I’d shared info about Microsoft Identity provider as it is an Azure AD B2C tenant, just as an alternate and additional option only. Sorry! for any confusion. Depending on your requirement, yes you can choose OIDC provider and characteristically works fine as documented here. || Microsoft loves open source.

    Once again, apologies for the inconvenience with this issue. Thanks for your valuable feedback.

    ---------
    To benefit the community find the right answers, please do mark the post which was helpful by clicking on Accept Answer’ & ‘Up-Vote’.

    1 person found this answer helpful.

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.