AWS Cognito Federated Identity Provider with Azure AD B2C Custom Policy

0

Hi, I have an Azure AD B2C Custom Policy, that gives me an identification token for the signed-in user along with the custom claims. I want to integrate this B2C Custom Policy as a federated identity provider in AWS Cognito. I went through the console to add this Azure B2C Custom Policy as an OIDC federated Identity provider. Using the Issuer URL I was also able to add the identity provider. When I try to test the federation using Hosted UI in Cognito, I am not able to get the id_token from B2C Custom Policy after the user signs-in. I end up getting an error - 'No Access Token in OAuth IdP response'. The B2C Policy is configured for both implicit grant as well as auth flow (both access and id tokens allowed). I only intend to have the id_token from B2C which should suffice my need of having users with their custom attributes in Cognito. Kindly share details of how this needs be done. Stuck with this issue for a couple of weeks with no progress and I am looking forward to an immediate implementation in a month.

1 Answer
0

To address/troubleshoot your issue for error message "No Access Token in OAuth IdP response", we require HAR file which is non-public information. Please open a support case with AWS using the following link and add your HAR log [1] for troubleshooting:

https://console.aws.amazon.com/support/home#/case/create


[1] https://repost.aws/knowledge-center/support-case-browser-har-file

AWS
SUPPORT ENGINEER
answered a year ago

You are not logged in. Log in to post an answer.

A good answer clearly answers the question and provides constructive feedback and encourages professional growth in the question asker.

Guidelines for Answering Questions