Replies: 1 comment
-
I could be misguided here but I think the access token provided by azure is for your application to make requests back to Microsoft graph api and not to access you application api. if you put your access token into jwt.io I am pretty sure the signature will not be correct. Only MS can validate the access token it provides. As for answers to do what you are trying to do…I.e. access you api via curl I have the same question. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hi OpenIDC contributor and community,
I have a reverse proxy set up, forwarding all requests coming to
my.reverse-proxy.de/
to a Tomcat athttp://mybackend.local.domain:8080/
within my local network. Additionally, I want to usemod_auth_openidc
to add authentication to the Tomcat using Azure AD.Now I have to send automated requests to this Tomcat, for example with Bash. To do this, I successfully receive an AuthToken directly via the Azure token endpoint using client credentials grant and then want to use this to access the Tomcat in the backend via my reverse proxy. Unfortunately, I always get a 401 status code back saying that my JWT token cannot be validated.
virtual host:
script:
response:
log:
Beta Was this translation helpful? Give feedback.
All reactions