Skip to content

Commit 44f8fb1

Browse files
authored
query strings are stripped if wildcards match hits
customer escalation to update the public doc to make the behavior of wildcards match and stripping query string clear: https://identitydivision.visualstudio.com/Engineering/_boards/board/t/Supportability%20-%20IDEEE%20-%20Authentication/Features/?workitem=2445241 Feature 2445241: [DOC] query strings are stripped if wildcards match in redirect uri
1 parent a5655d0 commit 44f8fb1

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/active-directory/develop/reply-url.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ To add a redirect URI that uses the `http` scheme with the `127.0.0.1` loopback
116116

117117
## Restrictions on wildcards in redirect URIs
118118

119-
Wildcard URIs like `https://*.contoso.com` may seem convenient, but should be avoided due to security implications. According to the OAuth 2.0 specification ([section 3.1.2 of RFC 6749](https://tools.ietf.org/html/rfc6749#section-3.1.2)), a redirection endpoint URI must be an absolute URI.
119+
Wildcard URIs like `https://*.contoso.com` may seem convenient, but should be avoided due to security implications. According to the OAuth 2.0 specification ([section 3.1.2 of RFC 6749](https://tools.ietf.org/html/rfc6749#section-3.1.2)), a redirection endpoint URI must be an absolute URI. As such, when a configured wildcard URI matches a redirect URI, query strings and fragments in the redirect URI are stripped.
120120

121121
Wildcard URIs are currently unsupported in app registrations configured to sign in personal Microsoft accounts and work or school accounts. Wildcard URIs are allowed, however, for apps that are configured to sign in only work or school accounts in an organization's Azure AD tenant.
122122

0 commit comments

Comments
 (0)