The redirect URL is configured on the OIDC side of things.
So it's likely a misconfiguration in AusWeisApp
Hi Andre,
Thanks for the reply, but I don't think so. The AusweisApp is receiving the redirect-url from Thinkwise which should be generated based on the meta server which is the custom domain in our case. So the callback url sent to AusweisApp is not correct (being the Azure domain). I can imagine that maybe some Azure configuration is involved.
Hello @Robert Wijn 2,
When using any kind of reverse proxy, such as an Azure Application Gateway or an Azure Front Door, in front of Indicium, you will need to configure the corresponding Reverse proxy settings in Indicium’s appsettings. This requirement actually has no relation to OIDC specifically, it is necessary for multiple reasons. I’m assuming that you’re either using Azure Front Door or Azure Application Gateway:
Azure Front Door
We have some specific documentation for Azure Front Door, which you can find here.
Azure Application Gateway
According to this Microsoft documentation, the Azure Application Gateway does not send an X-Forwarded-Host header by default, but it does send an X-Original-Host. So, if you’re using an Azure Application Gateway, you will have to add the following to the Reverse proxy settings in Indicium’s appsettings:
"CustomHeaders": {
"XForwardedHost": "X-ORIGINAL-HOST"
}
Furthermore the IP-range defined in KnownNetworks may have to be changed to the correct IP-range for your Application Gateway.
I hope this helps.
Hi Vincent,
Thanks for the information! This set us on the right track and eventually to the solution.