Hi Mark,
I’m not sure if I fully understand your specific use case but it seems close to what I had to implement, I vaguely remember working around the problem by setting up some permanent redirects on Apache to add the missing stuff.
With those redirects we can do IdP initiated SSO coming either from Azure/SAML or Azure/OIDC as IdP with our app as an OIDC Keycloak SP client.
Gr,
L
--
You received this message because you are subscribed to the Google Groups "Keycloak User" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
keycloak-use...@googlegroups.com.
To view this discussion on the web visit
https://groups.google.com/d/msgid/keycloak-user/3032ad87-2b97-4314-84ed-303f3ead9fban%40googlegroups.com.