Open
Conversation
Contributor
There was a problem hiding this comment.
Pull request overview
Adds documentation to clarify V1 vs V2 Microsoft Entra STS token issuer formats and links OIDC guidance to the new Entra-specific section so readers can choose the correct authority/issuer settings.
Changes:
- Adds a new STS token version section to the Entra Blazor Web App security article with V1/V2 authority examples and V2 migration notes.
- Adds cross-references from the OIDC Blazor Web App security article to the Entra article’s STS token version guidance.
- Expands authority examples in the Entra article to explicitly show both V1 and V2 issuer URL formats for ME-ID tenants.
Reviewed changes
Copilot reviewed 2 out of 2 changed files in this pull request and generated 6 comments.
| File | Description |
|---|---|
| aspnetcore/blazor/security/blazor-web-app-with-oidc.md | Adds repeated notes/cross-links pointing readers to Entra STS token version guidance. |
| aspnetcore/blazor/security/blazor-web-app-with-entra.md | Adds V1/V2 authority examples and a new STS token version section with V2 migration guidance. |
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Fixes #36978
Stephen ...
I'm currently only showing explicit token issuer validation with
TokenValidationParametersfor the web API (MinimalApiJwt). Should I also be doing that in the Blazor app'sProgramfile?In the web API config for
TokenValidationParameters, why is theValidAudiencejust the client id and not the full audience passed tojwtOptions.Audience? If I try to use the full audience value there, it 💥 with a mismatch error with Azure and explicitly tells me that its just looking for the client id.Is there anything we can do in
ServerWeatherForcasterto help devs troubleshoot the issuer (iss) thatawait downstreamApi.CallApiForUserAsyncis going to use? We can't give them ...... because the call will fail on a 401 (e.g., invalid token due to an invalid issuer or anything else), throwing an exception that prevents finding out what the issuer is. That would work fine for a working call, but that's not helpful when
CallApiForUserAsyncgoes 💥 on you, and you would like to see the decoded token injwt.ms. What's the best way to get the token out of theMicrosoft.IdentityAPI for troubleshooting?Internal previews