Oid and sub claim are missing from AAD V2 access token

Geethanjali 41 Reputation points Microsoft Vendor


Azure Active Directory
Azure Active Directory
An Azure enterprise identity service that provides single sign-on and multi-factor authentication.
14,760 questions
0 comments No comments
{count} votes

Accepted answer
  1. Shweta Mathur 15,066 Reputation points Microsoft Employee

    Hi @Geethanjali ,

    Thanks for reaching out.

    I understand that for first party application, you are not able to get oid and sub claim in access token.

    As this is first party application and when you are signing in with MSA account, MSA pass through the user and does not add as guest user object in the tenant.
    Since there is no object ID of User, so no OID claim returning in the token.

    Alternatively, OID and sub claims will be null and not returned in the token, if the user logs in into a tenant where the apps are not provisioned, and its service principal is missing in that tenant.

    Hope this will help.

    Please remember to "Accept Answer" if answer helped you.

1 additional answer

Sort by: Most helpful
  1. Geethanjali 41 Reputation points Microsoft Vendor

    Hi @Shweta Mathur
    Thank you for the help. As per the link, I have provisioned the Service Principal for my test application and was able to get the Oid and sub claim in the access token.
    Appreciate the help.!!