I have read a number of blogs including this:
https://www.codeproject.com/Articles/1254806/Authentication-and-Authorization-in-ASP-NET-Core-2
I am building building applications that use OpenIdConnect using Azure active directory. My desire is to limit access to each app to only users in specific groups. For example, App 1 can only be accessed by users in group 1 while app 2 is only accessed by users in group 2.
So, when a user of either app logins in using Azure AD, I want Azure AD to return the group claims for the logged in user. Based on the groups, I decide (from the app side) if the user is allowed to access the app or not. I have been able to figure out how to return the groups...
BUT
When I include the groupMemberClaims in the app manifest, I get the error Bad Request... which is as a result of too many headers added to the request since some of the users belong to so many security groups. This is my dilemma.
Anyone faced this issue before and how did you fix it?