-
Notifications
You must be signed in to change notification settings - Fork 5
Can/should OpenIdConnectCachingSecurityTokenProvider be fault tolerant? #9
Comments
Did you ever find a fix for this phatcher? I have strange scenario where this call works on my local computer running on local IIS, HTTPS, IIS Express development certificate however whenever any of the other developers check out my code they see the error you are getting. To troubleshoot my colleagues issue I have created a wildcard certificate and ensured I have hosted their APIs on the correct domain corresponding to the certificate. When I navigate to their APIs with this offending line of code commented out, the browser accepts the website is secure. If I switch my local machine to IIS Express I can reproduce their issue. All very stange seeing as it works so perfectly on my machine. I am suspecting a firewall problem but the switching between IIS local and express tells me it is certificate related. Anyone any ideas? |
@mikeybrin No resolution - and no engagement from the team either :-( |
I would recommend checking out this sample instead: https://github.com/Azure-Samples/active-directory-b2c-dotnet-webapp-and-webapi This sample is outdated and will soon be deprecated. If you're struggling with OWIN specifically, I would post a question on stack overflow with the proper tags |
@parakhj The new sample contains exactly the same code as the old one for the OpenIdConnectCachingSecurityTokenProvider - I'll raise the question over there, again. |
@phatcher For me this turned out to be a firewall issue where I needed to use our proxy server. Adding the following to the web.config seemed to do the trick: <system.net> The error was so vague when essentially the call to Microsoft was just getting blocked as no outbound traffic was permitted. Hope this helps. |
|
@mikeybrin Thanks for the update, it's a useful one to know |
Closing as this repo is being archived. |
Issue I had today was my API couldn't connect to Azure B2C, during startup which caused a yellow screen with the API.
Given that we are making an RPC call which can fail, does it make sense for the policy acquisition not to fail/throw so that the API doesn't crash at startup, it just can't authenticate using OAuth. When the service comes back, it will then pick up the policies, something like...
What I then get if the front-end can talk to B2C are
DX10500: Signature validation failed. Unable to resolve SecurityKeyIdentifier: 'SecurityKeyIdentifier
errors as the issuer/token are null in the API.What I don't know is if this is appropriate, i.e. JwtFormat keep calling the IIssuerSecurityTokenProvider, or am I abusing the interface.
The text was updated successfully, but these errors were encountered: