OpenID Connect Discovery 1.0 incorporating errata set 1 states:
issuer
REQUIRED. URL using the https scheme with no query or fragment
component that the OP asserts as its Issuer Identifier. If Issuer
discovery is supported (see Section 2), this value MUST be identical
to the issuer value returned by WebFinger. This also MUST be identical
to the iss Claim value in ID Tokens issued from this Issuer.
The "OpenID Connect Core 1.0 incorporating errata set 1" specification states:
16.15. Issuer Identifier OpenID Connect supports multiple
Issuers per Host and Port combination. The issuer returned by
discovery MUST exactly match the value of iss in the ID Token.
OpenID Connect treats the path component of any Issuer URI as being
part of the Issuer Identifier. For instance, the subject "1234" with
an Issuer Identifier of "https://example.com" is not equivalent to the
subject "1234" with an Issuer Identifier of
"https://example.com/sales".
It is RECOMMENDED that only a single Issuer per host be used. However,
if a host supports multiple tenants, multiple Issuers for that host
may be needed.
There is no reason to expect the client (which makes the Authorization Request) and Authorization server to be within the same DNS Domain.
Or
to expect the client to be in the same NDS Domain as the Resource Server.
The specifications do not define these Relationships so any relationships must be done using other Internet Specifications.
The only one I know of is the certificate "trust" relationships.
Be sure to read the OAuth 2.0 Security Best Current Practice