I am having an SPA application with .NET core backend that uses AD B2C. The SPA angular frontend uses angular-oauth2-oidc to create the loginflow. Sample :
this.authConfig = {
redirectUri: this.envService.redirectUri,
responseType: this.envService.responseType,
issuer: this.envService.issuer,
:
clientId: this.envService.clientId,
scope: this.envService.scope,
skipIssuerCheck: true,
clearHashAfterLogin: true,
oidc: true,
logoutUrl: this.envService.logoutUrl,
showDebugInformation: true,
};
: this.oauthService.configure(this.authConfig);
this.oauthService.tokenValidationHandler = new NullValidationHandler();
const helper = new JwtHelperService();
let url = this.DiscoveryDocumentConfig.signInURL;
:
:
this.oauthService.loadDiscoveryDocument(url).then(() => {
this.oauthService.tryLoginImplicitFlow().then(() => {
if (!this.oauthService.hasValidAccessToken()) {
this.oauthService.initImplicitFlow();
Now I am signing in using a magic link to signin to the application, the policy for the magic link extracts the the claims and issues an id_token (Sample - https://github.com/azure-ad-b2c/samples/tree/master/policies/sign-in-with-magic-link). In this case do I need to create a session myself or does AD B2C handle the same?
From an id_token accessing the application is it supported via msal or angular-oauth2-oidc ?Any pointers would be helpful.
Thanks