DEV Community

Discussion on: How to use Azure AD B2C as IdP for Amazon Cognito

Collapse
 
thomas_george profile image
Thomas George • Edited

This guy here is a life saver @marcostreng .Follow the steps mentioned above and make sure you add some more things.
1) Add the Application (client) ID of the web app that you created in azure AD B2C
to the authorization scope of oidc config in aws cognito

2) In the attribute mapping in aws cognito add
signInNames.emailAddress and map it to Email attribute of user pool

3) The issuer url should be in the following format
tenant-name.b2clogin.com/tenant-id...

And when you hit run discovery it will fail and you will get the option to add the oidc endpoints which you get from the url that @marcostreng mentioned ( tenant-name.b2clogin.com/tenant-na... ).

once you add all the corresponding endpoints then create the provider or update the provider and thats it it will work like a charm

Once again a big thanks to @marcostreng for helping me solve this.