I have created two different identity providers one saml2 based and another one OIDC, pointing to azure active directory, and have written routing rules accordingly which is working as expected.
However, I am unable to get any token information when redirected to localhost.
When I don’t give idpDiscover.requestContext in Okta sign-in widget configuration, I am able to login to OKTA home. So, it seems Okta is getting session information from Azure AD, however it’s unable to redirect to localhost. And why callback URL given in the application is not being honoured in case of IDP discovery?
Was going through below discussions but unable to make it work: