Skip to content
This repository has been archived by the owner on Nov 16, 2023. It is now read-only.

No Reply Address is registered for the application #77

Closed
ntaylor0909 opened this issue May 17, 2019 · 25 comments
Closed

No Reply Address is registered for the application #77

ntaylor0909 opened this issue May 17, 2019 · 25 comments

Comments

@ntaylor0909
Copy link

Steps to reproduce

I deployed the solution using the Deployment script and I ran into this error.

Expected behavior

I expected to be able to log in.

Actual behavior

It fails on re-directing back from the Azure AD authentication. I've tried putting a couple different Reply URLs into the Azure AD Application settings but it still won't let me log in. I'm not sure where to find the correct Reply URL in the App Service.

image

@Trafalger1
Copy link

I have this exact same issue, if anyone figures it out let me know. I've tried every combination of reply URL i could think of.

@ghost
Copy link

ghost commented May 20, 2019

Hi @ntaylor0909,

You are encountering this issue because the Azure AD application you are using for authentication has not been added as a reply address. You can solve this problem through the Azure management by performing the following

  1. Authenticate using credentials that have global admin privileges
  2. Click on Azure Active Directory (by default you can find this on the navigation bar on the lower left)
  3. Click App registrations
  4. Click on the application you created for this deployment
  5. Click authentication and add https://yoursite.azurewebsites.net/signin-oidc
  6. Click save to commit the changes

I will review the deployment documentation to see if I can identify the root cause for this.

@Trafalger1
Copy link

Thank you for the suggestion @IsaiahWilliams however the issue persists :(

@ghost
Copy link

ghost commented May 20, 2019

Hi @Trafalger1,

Just to confirm did you modify the value of the redirect URI you added to match your deployment? (e.g. if your website is partnersecurescore.azurewebsites.net the address would be https://partnersecurescore.azurewebsites.net/signin-oidc)

@Trafalger1
Copy link

Yes i did...

@Trafalger1
Copy link

If you'd like i can private email you our web app address @IsaiahWilliams

@Trafalger1
Copy link

I have tried about a dozen different URLs with no luck.
@IsaiahWilliams

@ghost
Copy link

ghost commented May 21, 2019 via email

@Trafalger1
Copy link

Trafalger1 commented May 21, 2019

yes exactly the same....

AADSTS50011: The reply url specified in the request does not match the reply urls configured for the application: '268a2edf-d030-48bd-b74b-xxxxxxxxxxx'.

@Trafalger1
Copy link

@ghost
Copy link

ghost commented May 21, 2019 via email

@Trafalger1
Copy link

Sure where would I look to confirm that?

@ghost
Copy link

ghost commented May 21, 2019 via email

@Trafalger1
Copy link

The app ID from the error message and the app ID of the app with the reply URL are identical if thats what your asking.

@ghost
Copy link

ghost commented May 21, 2019 via email

@Trafalger1
Copy link

image

@Trafalger1
Copy link

Trafalger1 commented May 21, 2019

image

@Trafalger1
Copy link

no joy @IsaiahWilliams

@ghost
Copy link

ghost commented May 21, 2019 via email

@Trafalger1
Copy link

Interesting ...

redirect_uri=http%3A%2F%2Fmyurlapp.azurewebsites.net%2Fsignin-oidc

@Trafalger1
Copy link

it worked...the redirect URL needed to be http NOT https:

i am in now i need to set it up for my CSP....

thank you for the help. I wonder why this isn't https tho..but at least for now I can test it out.

@ghost
Copy link

ghost commented May 21, 2019 via email

@Trafalger1
Copy link

Is it possible to force it to https after it's been deployed? or will that require a redeploy?

@ghost
Copy link

ghost commented May 21, 2019 via email

@ntaylor0909
Copy link
Author

@ghost ghost closed this as completed Jul 9, 2020
This issue was closed.
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants