How to pass refresh token of a third party IDP to the application via Azure AD B2C?

SamD 146 Reputation points

I’m working on an application which can read files of a given OneDrive account.

We use Azure AD B2C as the identity provider. Users can login to the application using their Microsoft account. For that we have enabled Microsoft as an Identity Provider in my AAD B2C tenant.

When a given user is login using their Microsoft account, application should be able to get both access_token and refresh_token which enables us to communicate with MS Graph API, in order to fetch file details.

Using custom policies we were able to fetch access_token. However, we cannot fetch the refresh_token.

This is how ClaimsSchema is defined in TrustFrameworkExtensions.xml :


Also in the same file, under the TechnicalProfile of Microsoft login, following OutputClaims node is added (some child nodes are removed for clarity):


Then under the relevant RelyingParty node following OutputClaims node is added (some child nodes are removed for clarity):


According to documentation there is no claim resolver for refresh_token.

Any suggestion to get this work?

Active Directory Federation Services
Active Directory Federation Services
An Active Directory technology that provides single-sign-on functionality by securely sharing digital identity and entitlement rights across security and enterprise boundaries.
955 questions
Azure Active Directory External Identities
No comments
{count} votes

Accepted answer
  1. AmanpreetSingh-MSFT 55,226 Reputation points

    Hello @SampathDilhan-7447

    To get both Access and Refresh tokens, you would need to federate MSA IDP via OAuth with B2C. As of now, for OIDC IDPs only Access Token is passed through.

    Please refer to below Technical Profile to add MSA IDP using OAuth:

    • Define Claim: <ClaimType Id="ms_access_token">
      <DisplayName>MS access token</DisplayName>
      <UserHelpText>access token form 3rd party MS AD. </UserHelpText>
      <ClaimType Id="ms_refresh_token">
      <DisplayName>MS Refresh token</DisplayName>
      <UserHelpText>refresh token form 3rd party MS AD. </UserHelpText>
    • Define Technical Profile: <ClaimsProvider>
      <DisplayName>Microsoft Account</DisplayName>
      <TechnicalProfile Id="MSA-OAuth">
      <DisplayName>Microsoft Account</DisplayName>
      <Protocol Name="OAuth2"/>
      <Item Key="AccessTokenEndpoint"></Item>
      <Item Key="authorization_endpoint"></Item>
      <Item Key="ClaimsEndpoint"></Item>
      <Item Key="ClaimsEndpointAccessTokenName">access_token</Item>
      <Item Key="BearerTokenTransmissionMethod">AuthorizationHeader</Item>
      <Item Key="client_id">XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX</Item>
      <Item Key="HttpBinding">POST</Item>
      <Item Key="scope"> offline_access</Item>
      <Item Key="UsePolicyInRedirectUri">0</Item>
      <Key Id="client_secret" StorageReferenceId="B2C_1A_MSASecret"/>
      <OutputClaim ClaimTypeReferenceId="identityProvider" DefaultValue="" />
      <OutputClaim ClaimTypeReferenceId="authenticationSource" DefaultValue="socialIdpAuthentication" />
      <OutputClaim ClaimTypeReferenceId="socialIdpUserId" PartnerClaimType="id"/>
      <OutputClaim ClaimTypeReferenceId="displayName" PartnerClaimType="name" />
      <OutputClaim ClaimTypeReferenceId="email" />
      <OutputClaim ClaimTypeReferenceId="ms_access_token" PartnerClaimType="{oauth2:access_token}"/>
      <OutputClaim ClaimTypeReferenceId="ms_refresh_token" PartnerClaimType="{oauth2:refresh_token}"/>
      <OutputClaimsTransformation ReferenceId="CreateRandomUPNUserName"/>
      <OutputClaimsTransformation ReferenceId="CreateUserPrincipalName"/>
      <OutputClaimsTransformation ReferenceId="CreateAlternativeSecurityId"/>
      <OutputClaimsTransformation ReferenceId="CreateSubjectClaimFromAlternativeSecurityId"/>
      <UseTechnicalProfileForSessionManagement ReferenceId="SM-SocialLogin" />

    This will return both Access and Refresh tokens, as highlighted below:


    Please "Accept the answer" if the information helped you. This will help us and others in the community as well.

0 additional answers

Sort by: Most helpful