hi
Client validation failed because 'http://localhost:4200' was not a valid redirect_uri for _3M_App.
The request URI matched a server endpoint: Authorization.
The authorization request was successfully extracted: {
"response_type": "code",
"client_id": "_3M_App",
"state": "aGJOeWhrUXZqN3pXYTFrcVRYRWpydzRwcW02WkdhUlJSaVlOdThOUjRsbUMy",
"redirect_uri": "http://localhost:4200",
"scope": "offline_access openid profile email phone _3M",
"code_challenge": "7dohmnVI2zU2qvJ6W0o2crV-UUr-EXRPil8l3_HJoYw",
"code_challenge_method": "S256",
"nonce": "aGJOeWhrUXZqN3pXYTFrcVRYRWpydzRwcW02WkdhUlJSaVlOdThOUjRsbUMy",
"culture": "en",
"ui-culture": "en"
}.
Client validation failed because 'http://localhost:4200' was not a valid redirect_uri for _3M_App.
The authorization request was rejected because the redirect_uri was invalid: 'http://localhost:4200'.
However, an attempt to login results in an HTTP 400 error message (see the screenshot attached
hi
Please share the full logs of backend app. Thanks
hi
You can copy the latest code of AbpValidateClientRedirectUri
and register it.
https://github.com/abpframework/abp/blob/0dfbbc0950280c496a01925df60be1cad1793917/modules/openiddict/src/Volo.Abp.OpenIddict.AspNetCore/Volo/Abp/OpenIddict/AbpOpenIddictAspNetCoreModule.cs#L120-L121
https://github.com/abpframework/abp/pull/16284
https://github.com/abpframework/abp/blob/dev/modules/openiddict/src/Volo.Abp.OpenIddict.AspNetCore/Volo/Abp/OpenIddict/WildcardDomains/AbpValidateClientRedirectUri.cs
hi Dicky.tech
Can you create a new question and share more info about this error? We will refund your question count.
hi
The MultiTenancyMiddlewareErrorPageBuilder
will respond to a 404 html page by default. But you can custom it.
eg: response a JSON result.
https://github.com/abpframework/abp/blob/e55c6f97174b10d982b73c5ae9c01b2edbe194df/framework/src/Volo.Abp.AspNetCore.MultiTenancy/Volo/Abp/AspNetCore/MultiTenancy/AbpAspNetCoreMultiTenancyOptions.cs#L31
https://docs.abp.io/en/abp/latest/Multi-Tenancy#abpmultitenancyoptions-handle-inactive-and-non-existent-tenants
hi
You have to override the GetUserInfoClaims
method.
https://github.com/abpframework/abp/blob/dev/modules/openiddict/src/Volo.Abp.OpenIddict.AspNetCore/Volo/Abp/OpenIddict/Controllers/UserInfoController.cs#L39
hi
Are there any steps that I can reproduce your problem?
hi
You can add Certificate in another way.
AddEncryptionCertificate
and AddSigningCertificate
has some override method.
string encryptionThumbprint = configuration["ThumbprintCertificate:EncryptionThumbprint"];
string signingThumbprint = configuration["ThumbprintCertificate:SigningThumbprint"];
context.Services.AddOpenIddict().AddServer(options =>
{
options.AddEncryptionCertificate(encryptionThumbprint, StoreName.My, StoreLocation.LocalMachine);
options.AddSigningCertificate(signingThumbprint, StoreName.My, StoreLocation.LocalMachine);
});
Or you provide some code and steps so that we can reproduce the problem in the new template project.