[maliming] said: hi
I'm not familiar with Azure.
Let’s make it clear:
- Can you use a different subdomain in Azure for tenants?
eg: https://tenant1.myazure.com https://tenant2.myazure.com
- For each tenant, I need to configure several URLs for login and logout. Even if it is only one per customer, there are more than one of those customers.
Where do you need to confiture URL? In the database or Azure?
Because you can use a wildcard redirect URL and a post-redirect URL in the database.
Thanks.
[maliming] said: hi
If you use a path as a tenant name, you don't need to use sub-domains. Path or subdomain you can only select one. I recommend to use sub-domain.
100 or 256 tenants are not enough for you?
Thanks.
For each tenant, I need to configure several URLs for login and logout. Even if it is only one per customer, there are more than one of those customers.
I know that this should be resolved with subdomains or paths, but not with both. That is not the question. The question is how to resolve it using Azure as an external provider.
[maliming] said: hi
Do you mean Azure doesn't support https://abp.io/community/articles/resolving-tenant-from-route-in-abp-framework-ah7oru97
Thanks.
No, sorry, what I mean is that with this way of resolving the tenant, using the path, should I also configure the URLs with the wildcard in Azure App Registration, the original problem in this thread (with subdomains).
In Azure App Registrations, I have to configure the return URLs. I cannot add one URL per client due to a limitation in Azure itself, nor does it allow me to add wildcards, which is the recommended practice.
https://learn.microsoft.com/en-us/entra/identity-platform/reply-url#maximum-number-of-redirect-uris-and-uri-length https://learn.microsoft.com/en-us/entra/identity-platform/reply-url#restrictions-on-wildcards-in-redirect-uris
[maliming] said: hi
You can see : https://abp.io/community/articles/resolving-tenant-from-route-in-abp-framework-ah7oru97
But using sub-domains will be easy.
Thanks.
Even so, the URL limitation in Azure remains; I cannot use wildcards. Does it support this?
[maliming] said: hi
Wildcard Support: Azure AD B2C does support wildcards in redirect URIs (e.g., https://*.app-app1-qa.commondomain.com/authentication/login), but Microsoft does not recommend this practice for security reasons.
I think you have to use wildcard domains for your apps.
Correlation cookie
You can configure this cookie share across wildcard domains.
See https://abp.io/community/articles/how-to-share-the-cookies-between-subdomains-jfrzggc2#gsc.tab=0
Thanks.
After several attempts, it has not worked.
Would it be possible to resolve the tenant in another way, similar to how Azure DevOps does it?
Something like: http:app.commondomain.com/tenant1/entity
Hello ABP Team,
Following the successful resolution of ticket #10222 regarding Domain/Subdomain Tenant Resolver implementation, we have encountered a critical issue when integrating this functionality with Azure AD B2C as an external authentication provider.
The domain/subdomain tenant resolution works perfectly in local development environments using OpenIddict, but fails when Azure AD B2C is enabled as the external provider, which is required for our QA, Preproduction, and Production environments in Azure.
Our application is deployed with environment-based subdomains and tenant resolution:
QA: https://tenant1.app-app1-qa.commondomain.com
Preproduction: https://tenant2.app-app1-pre.commondomain.com
Production: https://tenant3.app-app1.commondomain.com
The tenant (e.g., tenant1, tenant2) is resolved from the first subdomain label, following the implementation described in ticket #10222.
Following the solution provided by @maliming in ticket #10222, we successfully implemented:
AbpOpenIddictWildcardDomainOptions configuration with wildcard domain formatsAbpTenantResolveOptions with domain-based tenant resolversTokenWildcardIssuerValidator for JWT validation with wildcard issuersMyWebAssemblyMultiTenantUrlProvider in Blazor WASM client to extract tenant from subdomainResult: ✅ Works perfectly in local development with OpenIddict.
When attempting to replicate this behavior in Azure environments using Azure AD B2C as the external provider, we encounter authentication flow failures.
We identified a fundamental conflict between Azure AD B2C requirements and the subdomain-based tenant resolution strategy:
Current Redirect URIs registered in Azure AD B2C "App1 QA" app:
https://app-app1server-qa-qa-we-001.azurewebsites.net/signin-azuread-oidchttps://server-app1-qa.commondomain.com/signin-azuread-oidchttps://localhost:44329/signin-azuread-oidchttps://app-app1-qa.commondomain.com/authentication/loginhttps://app-app1-qa.commondomain.com/authentication/logouthttps://app-app1-qa.commondomain.com/signout/B2C_1_signupsignin01https://app-app1-qa.commondomain.com/signin-azuread-oidchttps://localhost:44385/signin-azuread-oidchttps://localhost:44385/authentication/logouthttps://localhost:44385/authentication/loginhttps://localhost:44385/signout/B2C_1_signupsignin01The Problem: To support subdomain-based tenant resolution, we would need to register one redirect URI per tenant, for example:
https://tenant1.app-app1-qa.commondomain.com/authentication/loginhttps://tenant2.app-app1-qa.commondomain.com/authentication/loginhttps://tenant3.app-app1-qa.commondomain.com/authentication/loginAzure AD B2C Limitation: According to Microsoft documentation, there is a hard limit on the number of redirect URIs that can be registered per App Registration.
This makes the manual registration approach not scalable for multi-tenant scenarios with subdomain resolution.
Wildcard Support: Azure AD B2C does support wildcards in redirect URIs (e.g., https://*.app-app1-qa.commondomain.com/authentication/login), but Microsoft does not recommend this practice for security reasons.
After researching and implementing various solutions found in documentation and forums, we have advanced in the authentication flow but now encounter a correlation cookie error:
'.AspNetCore.Correlation.Kh3ihYshY6FPVHu7SpFA9Uka76CC_IBMV0yO8yMcZxQ' cookie not found.
This error indicates that the correlation cookie used by ASP.NET Core during the OAuth/OpenID Connect authentication flow is not found or is not available when Azure AD B2C attempts to redirect back to the application.
Potential causes:
https://tenant1.app-app1-qa.commondomain.comtenant1 is automatically resolved from the subdomaintenant1) remains correctly applied throughout the sessionhttps://tenant1.app-app1-qa.commondomain.comtenant1 is correctly resolved from the subdomainThe primary use case for this functionality is to facilitate direct links to specific entities without requiring manual tenant specification.
Previous URL (without automatic resolution):
https://app-app1-qa.commondomain.com/Entity/36512651
Users had to manually select their tenant before accessing the patient record.
With subdomain-based tenant resolution, the tenant is automatically resolved from the URL:
Improved URL (with automatic resolution):
https://tenantCliente.app-app1-qa.commondomain.com/Entity/36512651
The system automatically detects tenantCliente from the subdomain, configures the appropriate context, and allows direct access to the record without intermediate steps.
This works perfectly in local development with OpenIddict, but fails when Azure AD B2C is enabled.
Is the Domain/Subdomain Tenant Resolver compatible with Azure AD B2C external authentication providers?
Are there additional configurations or workarounds required to make subdomain-based tenant resolution work with Azure AD B2C?
How can we resolve the correlation cookie error when using subdomains with Azure AD B2C authentication?
Is there a recommended approach for handling redirect URI configuration in Azure AD B2C for multi-tenant applications with subdomain resolution?
Are there known limitations or incompatibilities between:
Has ABP team tested or validated the Domain/Subdomain Tenant Resolver with Azure AD B2C in production scenarios?
We have tried various approaches to integrate Azure AD B2C, including:
None of these attempts have successfully resolved the correlation cookie error when using subdomain-based tenant resolution with Azure AD B2C.
We would greatly appreciate:
Official guidance or documentation on integrating Domain/Subdomain Tenant Resolver with external authentication providers like Azure AD B2C
Sample implementation or reference project demonstrating this integration
Clarification on whether this scenario is supported in the current ABP Framework version
Recommended architectural patterns for handling this use case in production Azure environments
Any known workarounds or alternative approaches that maintain the automatic tenant resolution functionality while working with Azure AD B2C
Thank you in advance for any guidance or assistance you can provide.
Related Issues:
[maliming] said: hi
Can you share the debug logs of 44393 website?
Thanks
If you wish, I can give you access to the source code where I am implementing it, so you can run the application yourself and see what happens. Please contact me by email, francisco.sierra@semicrol.com
Hi,
I have uploaded the log to the repository. You can find it here https://github.com/franciscosl-fnet/abp-app-domain-based/blob/main/Logs20251217.txt
When I take it to the production application, I am getting an error in this call: https://{0}.localhost:44393/.well-known/openid-configuration
The ports are different because it is another solution. What could be the reason for this?