Current Behavior
when using OIDC, the app cannot parse tokens if the tenant is set to multi-tenant properly. some info from the token will be lost.
Steps to Reproduce
- Deploy Dependency-Track with OIDC authentication enabled.
- Configure the application to use an external identity provider (e.g., Microsoft Entra ID) with the tenant set to multi-tenant.
- Configure the OIDC settings (issuer, client ID, client secret, redirect URI) according to the provider documentation.
- Assign users from a different tenant to the application.
- Attempt to log in using a user account from the external tenant.
- After successful authentication at the identity provider, observe the token returned to Dependency-Track.
- The application fails to parse the token correctly, resulting in missing claims (groups).
- Login either fails completely or succeeds with incomplete user information and incorrect authorization behavior.
Expected Behavior
whether multi or single tenant set, the token returned should properly be parsed and show all information without losing it.
Dependency-Track Version
4.7.x
Dependency-Track Distribution
Container Image
Database Server
PostgreSQL
Database Server Version
No response
Browser
Google Chrome
Checklist
Current Behavior
when using OIDC, the app cannot parse tokens if the tenant is set to multi-tenant properly. some info from the token will be lost.
Steps to Reproduce
Expected Behavior
whether multi or single tenant set, the token returned should properly be parsed and show all information without losing it.
Dependency-Track Version
4.7.x
Dependency-Track Distribution
Container Image
Database Server
PostgreSQL
Database Server Version
No response
Browser
Google Chrome
Checklist