Skip to main content

Using POSTMAN I am able to obtain a Token.

I paste the id_token in the access token location POSTMAN.

When clicking the Send command I receive a 401 error:

WWW-Authenticate: Bearer realm="d9e03690-59a1-453d-8439-8f9363f4eb30@https://login.microsoftonline.com/49793faf-eb3f-4d99-a0cf-aef7cce79dc1", scope="openid", authorization_uri="https://login.microsoftonline.com/49793faf-eb3f-4d99-a0cf-aef7cce79dc1", error="invalid_token", error_description="f5d5fc6e-8e49-4846-93b4-1c74ed8ad50f: Signature of the provided id token could not be validated against the public signing keys of the identity provider."

We use SSO with Azure AD. I am using a functional user that has admin permissions when answering the IFS authentication challenge, when acquiring the token. This functional user is not part of the Azure AD but I can sign into IFS as an admin using this users credentials.

I’m not sure how to use any other user due to the directory id and/or PW for SSO?

All help is appreciated.

 

Hi Kenneth @Z2094601 ,

 

I’ve seen you’ve referred the post IFS Authentication flow with OAuth and OpenID Connect – DSJ's Blog 

First, thanks for visiting my blog :blush: Please note that it explains obtaining token for IFS IDP (database authentication). Error could be that you obtained the token from IFS IDP and try to use it to authenticate with Azure AD.

 I haven’t worked with Azure AD yet but hope this post will help to obtain the token from Azure AD

Microsoft identity platform and OAuth 2.0 authorization code flow - Microsoft identity platform | Microsoft Docs

 

Hope it helps!

Damith