Hi @Anjam Tahir
Thank you for posting this in Microsoft Q&A.
I understand that you have configured front-channel logout for both APP1 and APP2, but when you log out of APP1, you cannot see the HTTP GET request to the logout page for APP2 being triggered, and hence you are still logged into APP2.
To clarify, when the user is redirected to the URI specified in the post_logout_redirect_uri
parameter, Azure AD B2C verifies that the value of post_logout_redirect_uri
matches one of the application's configured redirects URIs before performing the redirect, if a valid id_token_hint
is passed and the "Require ID Token in logout requests" is turned on. As you mentioned, you are already passing the id_token_hint
set to the id_token
to allow Azure AD B2C to verify the logout URL for each application. I would recommend double-checking this configuration.
Additionally, it is important to check whether third-party cookies are blocked. Many browsers are increasingly restricting third-party cookies for privacy reasons, which can impact the ability of applications to communicate logout events effectively across different domains or applications. Without third-party cookies, when a user logs out of one application, the front-channel logout mechanism may not propagate the logout event to other applications that rely on those cookies to identify the session. This means that existing access tokens for other applications for the same user will continue to be valid until their expiration time, and the user may still appear as logged in to those applications.
For more information: how to handle third-party cookie blocking in browsers
Hope this helps. Do let us know if you any further queries.
Thanks,
Navya.
If this answers your query, do click Accept Answer
and Yes
for was this answer helpful. And, if you have any further query do let us know.