Ready to post? First, try searching for your answer.
I have a fairly simple configuration where I want to authenticate my corporate users from Entra ID, but keep our clients in an Auth0 database. I created an app, added the Auth0 database and my Entra ID as an OIDC connection. Everything works as far as authentication goes BUT I’m somehow losing the group information from my Azure OIDC provider. I’ve written a test app that connects directly to the Azure OIDC app, and it correctly shows my group membership claims. I also have a post login trigger deployed on Auth0 and the debug messages for the event passed into show no group information claims. So somewhere it’s getting lost. Web searches and AI have not been helpful. I also repeated the above using the Azure AD connector, but have seen the same results. Is this a feature that’s only available to Enterprise customers?
TFW: You’re a newbie on a forum and you realize you can’t edit your own posts.
Hi @mpatnode
Welcome to the Auth0 Community!
I would recommend to review the following articles:
- Choose a Connection Type for Azure AD
- Connect Your App to Microsoft Azure Active Directory
- Configure Group Claims
- Groups with Azure AD Enterprise Connection
- Map Incoming Azure Groups to Auth0 ID Token
Otherwise, as long as you have set up your connection correctly and provided the necessary permissions, the groups should pe retrieved with the user profile and mapped into Auth’s groups
attribute.
If you have any other questions, feel free to leave a reply!
Kind Regards,
Nik
This topic was automatically closed 14 days after the last reply. New replies are no longer allowed.