Skip to content

Commit fea4857

Browse files
authored
update
1 parent 35d6adf commit fea4857

1 file changed

Lines changed: 10 additions & 2 deletions

File tree

support/entra/entra-id/app-integration/troubleshooting-signature-validation-errors.md

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
title: Troubleshoot Access Token Signature Validation Errors
33
description: Helps you troubleshoot access token signature validation errors and provides solutions in some scenarios.
4-
ms.date: 07/18/2025
4+
ms.date: 08/06/2025
55
ms.reviewer: willfid
66
ms.service: entra-id
77
ms.custom: sap:Developing or Registering apps with Microsoft identity platform
88
---
99
# Troubleshoot access token signature validation errors
1010

11-
When an Azure resource provider, other than Microsoft Entra ID, validate an access token's signature, signature validation errors occur. These errors might result from the signing key being unavailable or failing to validate the signature. This article helps you troubleshoot such errors and provides solutions in some scenarios.
11+
When a resource provider validates an access token's signature, signature validation errors occur. These errors might result from the signing key being unavailable or failing to validate the signature. This article helps you troubleshoot such errors and provides solutions in some scenarios.
1212

1313
## Step 1: Decode the access token
1414

@@ -94,6 +94,10 @@ Check the `iss` claim of the access token. The `iss` claim indicates who issued
9494
- `https://sts.windows.net/{tenant-id}` (used for v1.0 tokens)
9595
- `https://login.microsoftonline.com/{tenant-id}/v2.0` (used for v2.0 tokens)
9696

97+
- For Microsoft Entra External ID-issued tokens, the `iss` claim has this format:
98+
99+
`https://{your-domain}.ciamlogin.com/{tenant-id}/v2.0/`
100+
97101
- For Azure AD B2C-issued tokens, the `iss` claim has this format:
98102

99103
`https://{your-domain}.b2clogin.com/tfp/{tenant-id}/{policy-id}/v2.0/`
@@ -104,6 +108,10 @@ To avoid signature validation errors, configure your OpenID Connect Metadata cor
104108

105109
For more information, see [OpenID Connect on the Microsoft identity platform](/entra/identity-platform/v2-protocols-oidc).
106110

111+
- For Microsoft Entra External ID-issued tokens, make sure the OpenId Connect Metadata configuration looks like `https://{tenant-domain}.ciamlogin.com/{tenant-id}/v2.0/.well-known/openid-configuration`.
112+
113+
For more information, see [Set up your OpenID Connect identity provider](/entra/external-id/customers/how-to-custom-oidc-federation-customers#set-up-your-openid-connect-identity-provider).
114+
107115
- For Azure AD B2C-issued tokens, make sure the OpenId Connect Metadata configuration looks like `<https://{your-domain}.b2clogin.com/{tenant-id}/{b2c-policy}/v2.0/.well-known/openid-configuration`.
108116

109117
For more information, see [Web sign in with OpenID Connect in Azure Active Directory B2C](/azure/active-directory-b2c/openid-connect).

0 commit comments

Comments
 (0)