最新消息:雨落星辰是一个专注网站SEO优化、网站SEO诊断、搜索引擎研究、网络营销推广、网站策划运营及站长类的自媒体原创博客

azure active directory - Id token in microsoft with .Default scope - Stack Overflow

programmeradmin1浏览0评论
  1. i requested scopes openid, email separately and get an id token, in response of the oauth2.0 process and can decode it to retrieve user email
  2. While if i have openid scope added to the app , and request ./default scope, i don't get any id token

Why doesn't defaul with granted openid give an id token?

  1. i requested scopes openid, email separately and get an id token, in response of the oauth2.0 process and can decode it to retrieve user email
  2. While if i have openid scope added to the app , and request ./default scope, i don't get any id token

Why doesn't defaul with granted openid give an id token?

Share Improve this question asked Feb 10 at 10:39 codexcodex 234 bronze badges 3
  • Could you include what authentication flow you are using to generate tokens? – Sridevi Commented Feb 10 at 10:44
  • oauth2.0 single tenant microsoft entra app with admin consent – codex Commented Feb 10 at 11:43
  • Are you using delegated flows like authorization code flow? – Sridevi Commented Feb 10 at 11:46
Add a comment  | 

1 Answer 1

Reset to default 1

Initially, I registered one application and granted below API permissions in it:

Now, I ran below authorization request in browser with /.default scope to get code value:

https://login.microsoftonline/tenantId/oauth2/v2.0/authorize? 
client_id=appId
&response_type=code  
&redirect_uri=https://jwt.ms
&response_mode=query  
&scope=https://graph.microsoft/.default
&state=12345

When I requested tokens with /.default scope, I too got only access token in response without ID token:

POST https://login.microsoftonline/<tenantID>/oauth2/v2.0/token
grant_type:authorization_code
client_id:appID
client_secret:secret
scope: https://graph.microsoft/.default
code:<code_from_above_Step>
redirect_uri: https://jwt.ms

Note that, openid, profile, email and offline_access are OpenID Connect (OIDC) scopes.

  • When you request /authorize endpoint with ./default scope, it aggregates the delegated permissions granted to the app for Microsoft Graph API or other APIs and does not trigger OpenID Connect (OIDC) behavior for authentication.
  • To get ID token, make sure to explicitly request openid scope in the /authorize request.

In my case, I explicitly included openid and email in scopes of authorization request while getting code value:

https://login.microsoftonline/tenantId/oauth2/v2.0/authorize? 
client_id=appId
&response_type=code  
&redirect_uri=https://jwt.ms
&response_mode=query  
&scope=https://graph.microsoft/.default openid email
&state=12345

When I requested tokens with ./default scope, I got response with both access token and ID token as below:

POST https://login.microsoftonline/<tenantID>/oauth2/v2.0/token
grant_type:authorization_code
client_id:appID
client_secret:secret
scope: https://graph.microsoft/.default
code:<code_from_above_Step>
redirect_uri: https://jwt.ms

Response:

When I decoded this ID token in jwt.ms website, it has signed-in user's email as below:

In your case, make sure to explicitly include openid and email in scope parameter of authorization request. If authentication is done like that, you can get both tokens with /.default scope too.

Reference:

Microsoft Graph permissions reference - Microsoft Graph | Microsoft Learn

发布评论

评论列表(0)

  1. 暂无评论
ok 不同模板 switch ($forum['model']) { /*case '0': include _include(APP_PATH . 'view/htm/read.htm'); break;*/ default: include _include(theme_load('read', $fid)); break; } } break; case '10': // 主题外链 / thread external link http_location(htmlspecialchars_decode(trim($thread['description']))); break; case '11': // 单页 / single page $attachlist = array(); $imagelist = array(); $thread['filelist'] = array(); $threadlist = NULL; $thread['files'] > 0 and list($attachlist, $imagelist, $thread['filelist']) = well_attach_find_by_tid($tid); $data = data_read_cache($tid); empty($data) and message(-1, lang('data_malformation')); $tidlist = $forum['threads'] ? page_find_by_fid($fid, $page, $pagesize) : NULL; if ($tidlist) { $tidarr = arrlist_values($tidlist, 'tid'); $threadlist = well_thread_find($tidarr, $pagesize); // 按之前tidlist排序 $threadlist = array2_sort_key($threadlist, $tidlist, 'tid'); } $allowpost = forum_access_user($fid, $gid, 'allowpost'); $allowupdate = forum_access_mod($fid, $gid, 'allowupdate'); $allowdelete = forum_access_mod($fid, $gid, 'allowdelete'); $access = array('allowpost' => $allowpost, 'allowupdate' => $allowupdate, 'allowdelete' => $allowdelete); $header['title'] = $thread['subject']; $header['mobile_link'] = $thread['url']; $header['keywords'] = $thread['keyword'] ? $thread['keyword'] : $thread['subject']; $header['description'] = $thread['description'] ? $thread['description'] : $thread['brief']; $_SESSION['fid'] = $fid; if ($ajax) { empty($conf['api_on']) and message(0, lang('closed')); $apilist['header'] = $header; $apilist['extra'] = $extra; $apilist['access'] = $access; $apilist['thread'] = well_thread_safe_info($thread); $apilist['thread_data'] = $data; $apilist['forum'] = $forum; $apilist['imagelist'] = $imagelist; $apilist['filelist'] = $thread['filelist']; $apilist['threadlist'] = $threadlist; message(0, $apilist); } else { include _include(theme_load('single_page', $fid)); } break; default: message(-1, lang('data_malformation')); break; } ?>