OIDC with Azure not working

everestctl settings oidc configure \                             
    --issuer-url="https://login.microsoftonline.com/$TENANT/v2.0" \
    --client-id="$APP" \
    --scopes="openid,profile,email,$APP/.default"

I setup the application as an SPA with the correct redirect URL. I can “login”, but then then Everest stops with “internal error”.

I’ve inspected the logs:

{"level":"error","T":"2025-08-07T14:01:51Z","logger":"everest","caller":"session/manager.go:215","msg":"failed to shorten token: could not extract jti"}

I think by default the app is using the ID token, do I need access tokens? The docs are not clear on this. I’ve had this problem with 1.7.0 and also 1.8.0.

1 Like

Posted on GitHub, was told it’s fixed by this: EVEREST-2210 Fix session blockList for MS Entra by maxkondr · Pull Request #1565 · percona/everest · GitHub