I used only one app and still it worked. not sure why do we need two apps. Also the significance of each app is not explained.
In an Id token, why do we need two apps?
Without application secret, how these apps are being used?
⚠Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.
@agrabhi
Thanks for your feedback! We will investigate and update as appropriate.
@agrabhi Azure AD B2C's trust framework internally attempts to obtain a token for the IdentityExperienceFramework app (Web API) using the ProxyIdentityExperienceFramework app (Native app) during the sign in process. You do not need to specify a secret for the client application (ProxyIdentityExperienceFramework) as it is registered as a Native application. The TokenSigningContainer key you have created is used to sign the ID and access tokens that are issued by Azure AD B2C to your relying party applications.
@agrabhi We will now proceed to close this thread. If there are further questions regarding this matter, please reopen it and we will gladly continue the discussion.
This is still not abundantly clear.
Why is the IdentityExperienceFramework app necessary? Can't the token audience be the same as the application making the request (i.e. the ProxyIdentityExperienceFramework app)?
Most helpful comment
This is still not abundantly clear.
Why is the IdentityExperienceFramework app necessary? Can't the token audience be the same as the application making the request (i.e. the ProxyIdentityExperienceFramework app)?