Skip to content

Commit a03657e

Browse files
authoredAug 12, 2022
fix(providers): Add appid param to Azure AD wellKnown URL (#5138)
This fixes: #5137 Relevent documentation: > If the application has custom signing keys as a result of using the claims-mapping feature, append an appid query parameter that contains the application ID to get a jwks_uri that points to the signing key information of the application, which should be used for validation. https://docs.microsoft.com/en-us/azure/active-directory/develop/access-tokens#validating-the-signature
1 parent 3e312d0 commit a03657e

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed
 

‎packages/next-auth/src/providers/azure-ad.ts

+1-1
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ export default function AzureAD<P extends AzureADProfile>(
2525
id: "azure-ad",
2626
name: "Azure Active Directory",
2727
type: "oauth",
28-
wellKnown: `https://login.microsoftonline.com/${tenant}/v2.0/.well-known/openid-configuration`,
28+
wellKnown: `https://login.microsoftonline.com/${tenant}/v2.0/.well-known/openid-configuration?appid=${options.clientId}`,
2929
authorization: {
3030
params: {
3131
scope: "openid profile email",

0 commit comments

Comments
 (0)
Please sign in to comment.