@@ -27,29 +27,29 @@ public AzureADB2COpenIDConnectEventHandlers(string schemeName, MicrosoftIdentity
27
27
28
28
public Task OnRedirectToIdentityProvider ( RedirectContext context )
29
29
{
30
- var defaultPolicy = Options . DefaultPolicy ;
30
+ var defaultUserFlow = Options . DefaultUserFlow ;
31
31
if ( context . Properties . Items . TryGetValue ( OidcConstants . PolicyKey , out var policy ) &&
32
32
! string . IsNullOrEmpty ( policy ) &&
33
- ! string . Equals ( policy , defaultPolicy , StringComparison . OrdinalIgnoreCase ) )
33
+ ! string . Equals ( policy , defaultUserFlow , StringComparison . OrdinalIgnoreCase ) )
34
34
{
35
35
context . ProtocolMessage . Scope = OpenIdConnectScope . OpenIdProfile ;
36
36
context . ProtocolMessage . ResponseType = OpenIdConnectResponseType . IdToken ;
37
- context . ProtocolMessage . IssuerAddress = BuildIssuerAddress ( context , defaultPolicy , policy ) ;
37
+ context . ProtocolMessage . IssuerAddress = BuildIssuerAddress ( context , defaultUserFlow , policy ) ;
38
38
context . Properties . Items . Remove ( OidcConstants . PolicyKey ) ;
39
39
}
40
40
41
41
return Task . CompletedTask ;
42
42
}
43
43
44
- private string BuildIssuerAddress ( RedirectContext context , string defaultPolicy , string policy )
44
+ private string BuildIssuerAddress ( RedirectContext context , string defaultUserFlow , string userFlow )
45
45
{
46
- if ( ! _policyToIssuerAddress . TryGetValue ( policy , out var issuerAddress ) )
46
+ if ( ! _policyToIssuerAddress . TryGetValue ( userFlow , out var issuerAddress ) )
47
47
{
48
- _policyToIssuerAddress [ policy ] = context . ProtocolMessage . IssuerAddress . ToLowerInvariant ( )
49
- . Replace ( $ "/{ defaultPolicy . ToLowerInvariant ( ) } /", $ "/{ policy . ToLowerInvariant ( ) } /") ;
48
+ _policyToIssuerAddress [ userFlow ] = context . ProtocolMessage . IssuerAddress . ToLowerInvariant ( )
49
+ . Replace ( $ "/{ defaultUserFlow . ToLowerInvariant ( ) } /", $ "/{ userFlow . ToLowerInvariant ( ) } /") ;
50
50
}
51
51
52
- return _policyToIssuerAddress [ policy ] ;
52
+ return _policyToIssuerAddress [ userFlow ] ;
53
53
}
54
54
55
55
public Task OnRemoteFailure ( RemoteFailureContext context )
@@ -65,7 +65,7 @@ public Task OnRemoteFailure(RemoteFailureContext context)
65
65
if ( context . Failure is OpenIdConnectProtocolException && context . Failure . Message . Contains ( "AADB2C90118" ) )
66
66
{
67
67
// If the user clicked the reset password link, redirect to the reset password route
68
- context . Response . Redirect ( $ "{ context . Request . PathBase } /AzureADB2C /Account/ResetPassword/{ SchemeName } ") ;
68
+ context . Response . Redirect ( $ "{ context . Request . PathBase } /MicrosoftIdentity /Account/ResetPassword/{ SchemeName } ") ;
69
69
}
70
70
// Access denied errors happen when a user cancels an action on the Azure Active Directory B2C UI. We just redirect back to
71
71
// the main page in that case.
@@ -79,7 +79,7 @@ public Task OnRemoteFailure(RemoteFailureContext context)
79
79
}
80
80
else
81
81
{
82
- context . Response . Redirect ( $ "{ context . Request . PathBase } /AzureADB2C /Account/Error") ;
82
+ context . Response . Redirect ( $ "{ context . Request . PathBase } /MicrosoftIdentity /Account/Error") ;
83
83
}
84
84
85
85
return Task . CompletedTask ;
0 commit comments