Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Feature Request]: Configuration for discovery endpoint custom query parameters. #1887

Open
mdcarr941 opened this issue Jan 8, 2024 · 0 comments

Comments

@mdcarr941
Copy link

mdcarr941 commented Jan 8, 2024

Is your feature request related to a problem? Please describe.
When adding custom claims to JWT tokens in Microsoft Entra ID, you must configure a custom signing key (or disable claims validation, but that is definitely not a good idea). In order to get the corresponding public key for verification, the Open ID connect client is required to send the appid parameter as a query parameter with the discovery request [1]. There doesn't seem to be a way of to do this with angular-auth-oidc-client as of today.

Describe the solution you'd like
A new configuration parameter, modeled after customParamsAuthRequest, called customParamsDiscoveryRequest which has type object. The keys in this object are the verbatim names of the query parameters to add to the discovery request and the corresponding values define what to send in that parameter.

Describe alternatives you've considered
I'm considering moving to the MSAL for frontend authentication.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant