-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix: Cached AccessToken missing realm property in OIDC scenario #6689
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the PR! Can you please add a test & generate changefiles by running npm run beachball:change
from the root of the repo.
@microsoft-github-policy-service agree [company="Dialexa, an IBM Company"] |
@microsoft-github-policy-service agree company="Dialexa, an IBM Company" |
@tnorling addressed comment and added a test. The beachball command reported no change files are needed. |
Ah I suspect this is because your feature branch is also called dev. Can you try another branch? |
Good call! Sorry for the messy commits, but I got the change files in place! |
@tnorling Hello! Is there anything I can do to help this land? |
@bbush915 I can help land this. Looks like some tests are failing. |
@sameerag I validated that tests are all passing locally. Is there anything I can do to troubleshoot the failing E2E tests? It looks like they are all reporting: |
…e OIDC-compliant authority. In the case an application is using a separate OIDC-compliant authority and the tid claim is empty, the cached access token does not contain a realm property. One side-effect is that the cached access token will fail the isAccessTokenEntity check, preventing it from being re-used.
Hey cool and awesome former colleagues 🙂! Can this get approved and merged? It's blocking a couple companies and their clients including one I'm helping with 😅🙏🏾. So sorry, for the push and hope I don't come off as rude! |
Approved and updated the base branch. Hopefully tests pass now. |
In the case an application is using a separate OIDC-compliant authority and the tid claim is empty, the cached access token does not contain a realm property. One side-effect is that the cached access token will fail the isAccessTokenEntity check, preventing it from being re-used.