Define an OAuth2 custom error technical profile in an Azure Active Directory B2C custom policy
This article describes how to handle an OAuth2 custom error with Azure Active Directory B2C (Azure AD B2C). Use this technical profile if something logic goes wrong within your policy. The technical profile returns error to your OAuth2 or OpenId Connect relying party application. Check out the Live demo of the OAuth2 custom error technical profile.
To handle custom OAuth2 error message:
- Define an OAuth2 error technical profile.
- Set the error code, and error message claims.
- From the user journey, call the OAuth2 error technical profile.
OAuth2 error
The error is return with the following data:
- error -
access_denied
- error_description - The error message using the convention
AAD_Custom_<errorCode>: <errorMessage>
. - Correlation ID - The Azure AD B2C correlation ID.
- Timestamp - The timestamp of the error.
The following example demonstrates a custom error message return to the https://jwt.ms app:
https://jwt.ms/#error=access_denied&error_description=AAD_Custom_1234%3a+My+custom+error+message%0d%0aCorrelation+ID%3a+233bf9bd-747a-4800-9062-6236f3f69a47%0d%0aTimestamp%3a+2021-03-25+14%3a01%3a23Z%0d%0a
Protocol
The Name attribute of the Protocol element needs to be set to OAuth2
. Set the OutputTokenFormat element to OAuth2Error
.
The following example shows a technical profile for ReturnOAuth2Error
:
<!--
<ClaimsProviders> -->
<ClaimsProvider>
<DisplayName>Token Issuer</DisplayName>
<TechnicalProfiles>
<TechnicalProfile Id="ReturnOAuth2Error">
<DisplayName>Return OAuth2 error</DisplayName>
<Protocol Name="OAuth2" />
<OutputTokenFormat>OAuth2Error</OutputTokenFormat>
<CryptographicKeys>
<Key Id="issuer_secret" StorageReferenceId="B2C_1A_TokenSigningKeyContainer" />
</CryptographicKeys>
<InputClaims>
<InputClaim ClaimTypeReferenceId="errorCode" />
<InputClaim ClaimTypeReferenceId="errorMessage" />
</InputClaims>
</TechnicalProfile>
</TechnicalProfiles>
</ClaimsProvider>
<!--
</ClaimsProviders> -->
Define claims transformation to generate custom values of error code and error message
Use these steps to generate custom values of error code and error message:
Locate the
ClaimsTransformations
element, then add the following code inside it<!-- <ClaimsTransformations> --> <ClaimsTransformation Id="GenerateErrorCode" TransformationMethod="CreateStringClaim"> <InputParameters> <InputParameter Id="value" DataType="string" Value="Error_001" /> </InputParameters> <OutputClaims> <OutputClaim ClaimTypeReferenceId="errorCode" TransformationClaimType="createdClaim" /> </OutputClaims> </ClaimsTransformation> <ClaimsTransformation Id="GenerateErrorMessage" TransformationMethod="CreateStringClaim"> <InputParameters> <InputParameter Id="value" DataType="string" Value="Insert error description." /> </InputParameters> <OutputClaims> <OutputClaim ClaimTypeReferenceId="errorMessage" TransformationClaimType="createdClaim" /> </OutputClaims> </ClaimsTransformation> <!-- </ClaimsTransformations> -->
Add the two claims transformations in the
OutputClaimsTransformations
element of any technical profile before Oauth2 technical that you define:<OutputClaimsTransformations> <OutputClaimsTransformation ReferenceId="generateErrorCode" /> <OutputClaimsTransformation ReferenceId="generateErrorMessage" /> </OutputClaimsTransformations>
Input claims
The InputClaims element contains a list of claims required to return OAuth2 error.
ClaimReferenceId | Required | Description |
---|---|---|
errorCode | Yes | The error code. |
errorMessage | Yes | The error message. |
Cryptographic keys
The CryptographicKeys element contains the following key:
Attribute | Required | Description |
---|---|---|
issuer_secret | Yes | An X509 certificate (RSA key set). Use the B2C_1A_TokenSigningKeyContainer key you configure in Get started with custom policies. |
Invoke the technical profile
You can call the OAuth2 error technical profile from a user journey, or sub journey (type of transfer
). Set the orchestration step type to SendClaims
with a reference to your OAuth2 error technical profile.
If your user journey or sub journey already has another SendClaims
orchestration step, set the DefaultCpimIssuerTechnicalProfileReferenceId
attribute to the token issuer technical profile.
In the following example:
- The user journey
SignUpOrSignIn-Custom
sets theDefaultCpimIssuerTechnicalProfileReferenceId
to the token issuer technical profileJwtIssuer
. - The eighth orchestration step checks whether the
errorCode
exists. If yes, call theReturnOAuth2Error
technical profile to return the error. - If
errorCode
doesn't exist, the ninth orchestration step issues the token.
<UserJourney Id="SignUpOrSignIn-Custom" DefaultCpimIssuerTechnicalProfileReferenceId="JwtIssuer">
<OrchestrationSteps>
...
<OrchestrationStep Order="8" Type="SendClaims" CpimIssuerTechnicalProfileReferenceId="ReturnOAuth2Error">
<Preconditions>
<Precondition Type="ClaimsExist" ExecuteActionsIf="false">
<Value>errorCode</Value>
<Action>SkipThisOrchestrationStep</Action>
</Precondition>
</Preconditions>
</OrchestrationStep>
<OrchestrationStep Order="9" Type="SendClaims" CpimIssuerTechnicalProfileReferenceId="JwtIssuer" />
</OrchestrationSteps>
<ClientDefinition ReferenceId="DefaultWeb" />
</UserJourney>
Optionally, you can use preconditions to manipulate the Oauth2 error technical profile. For example, if there is no email claim, you can set to call Oauth2 error technical profile:
<OrchestrationStep Order="3" Type="SendClaims" CpimIssuerTechnicalProfileReferenceId="ReturnOAuth2Error">
<Preconditions>
<Precondition Type="ClaimsExist" ExecuteActionsIf="false">
<Value>email</Value>
<Action>SkipThisOrchestrationStep</Action>
</Precondition>
</Preconditions>
</OrchestrationStep>
Next steps
Learn about UserJourneys