Home

Invalid issuer o signature error in SPO Provider-Hosted AddIns

%3CLINGO-SUB%20id%3D%22lingo-sub-165204%22%20slang%3D%22en-US%22%3EInvalid%20issuer%20o%20signature%20error%20in%20SPO%20Provider-Hosted%20AddIns%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-165204%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3E(Note%3A%26nbsp%3B%3CSTRONG%3Ewe%20have%20already%20verified%20that%20this%20is%20not%20a%20problem%20with%20expired%20client%20secrets)%3C%2FSTRONG%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EHi%20all%2C%20we%20are%20having%20problems%20with%20SPO%20Provider-Hosted%20Add-Ins%20were%20we%20are%20using%20remote%20event%20receivers...all%20of%20these%20Add-Ins%20were%20working%20last%20week%2C%20but%20have%20stopped%20working%20Today.%20Could%20you%20please%20help%20us%20with%20identifying%20what's%20happening%3F%20We%20are%20seeing%20the%20problem%20in%204-5%20tenants%20and%20with%202-3%20different%20applications.%20I%20have%20attached%20a%20document%20with%20the%20troubleshooting%20we%20have%20done%20and%20also%20our%20findings.%20As%20you%20can%20imagine%2C%20it's%20quite%20urgent%20for%20us%20to%20get%20information%20and%20a%20workaround%20about%20how%20to%20fix%20it...we%20also%20opened%20a%20support%20case%2C%20but%20support%20folks%20told%20us%20that%20they%20don't%20provide%20help%20for%20this%20kind%20of%20issues.%20Thanks%20in%20advance!%20cc%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F369%22%20target%3D%22_blank%22%3E%40Vesa%20Juvonen%3C%2FA%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-165204%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EDeveloper%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-169742%22%20slang%3D%22en-US%22%3ERe%3A%20Invalid%20issuer%20o%20signature%20error%20in%20SPO%20Provider-Hosted%20AddIns%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-169742%22%20slang%3D%22en-US%22%3E%3CP%3EHi%2C%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EI%20have%20no%20idea%20about%20the%20deployment%20thing.%20For%20me%20it%20seems%20that%20it%20does%20not%20matter%20who%20makes%20the%20deployment%20-%20but%20I%20guess%20you%20just%20need%20to%20check%20it.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20for%20the%20client%20id%20and%20secret%20-%20I%20didn't%20have%20to%20re-generate%20anything%2C%20luckily.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-169707%22%20slang%3D%22en-US%22%3ERe%3A%20Invalid%20issuer%20o%20signature%20error%20in%20SPO%20Provider-Hosted%20AddIns%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-169707%22%20slang%3D%22en-US%22%3E%3CP%3EHello%20Slwomir%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThanks%20for%20Replying%2C%20I%20have%20two%20questions.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E1)%20In%20order%20to%20deploy%20the%20apps%20on%20Azure%20and%20SharePoint%20Shall%20we%20need%20to%20have%20same%20login%20account%20for%20both%20%3F%26nbsp%3B%3C%2FP%3E%0A%3CP%3ELet's%20say%20my%20Login%20account%20for%20SharePoint%20is%20-%20rajat.chauhan%40xyztst.onmicrosoft.com%3C%2FP%3E%0A%3CP%3EAnd%20My%20login%20Id%20for%20Azure%20is%20-%20rajat.chauhan%40xyz365.onmicrosoft.com%26nbsp%3B%20would%20it%20work%20%3F%3C%2FP%3E%0A%3CP%3E2)%20After%20adding%20the%26nbsp%3BHostedAppHostNameOverride%20in%20application%20settings%20Do%20we%20need%20to%20generate%20new%20client%20ID%20and%20client%20secret%20to%20deploy%20apps%20%3F%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThank%20you%20in%20advance%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-169705%22%20slang%3D%22en-US%22%3ERe%3A%20Invalid%20issuer%20o%20signature%20error%20in%20SPO%20Provider-Hosted%20AddIns%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-169705%22%20slang%3D%22en-US%22%3E%3CP%3EHello%20Rajat%2C%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIt%20did%20work%20for%20me%2C%20even%20for%20remote%20event%20receivers%20(at%20least%20the%20one%26nbsp%3Bbeing%20triggered%20when%20the%20add-in%20is%20being%20uninstalled).%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20basic%20rule%20is%20to%20make%20sure%20that%20this%20value%20contains%20the%20text%20that%20is%20displayed%20to%20you%20in%20the%20error%20message%20%22(...)%26nbsp%3Bis%20not%20the%20intended%20audience%20%3CIMPORTANT_TEXT%3E%22.%20So%20you%20take%20the%20important_text%20value%20from%20your%20log%20message%2C%20strip%20if%20from%20the%20part%20before%20the%20%22%2F%22%20sign%20and%20the%20part%20after%20the%20%22%40%22%20sign%20(see%20the%20content%20of%20TokenHelper.GetFormattedPrincipal%20method%20for%20details%20on%20what%20is%20going%20on%20there)%2C%20and%20put%20it%20in%20the%26nbsp%3B%3CSPAN%3EHostedAppHostNameOverride.%3C%2FSPAN%3E%3C%2FIMPORTANT_TEXT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAlso%2C%20as%20you've%20probably%20seen%2C%20the%26nbsp%3B%3CSPAN%3EHostedAppHostNameOverride%26nbsp%3Bparameter%20can%20be%20a%20semicolon-separated-value%2C%20so%20you%20can%20put%20several%20values%20there.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EHope%20this%20helps.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-169703%22%20slang%3D%22en-US%22%3ERe%3A%20Invalid%20issuer%20o%20signature%20error%20in%20SPO%20Provider-Hosted%20AddIns%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-169703%22%20slang%3D%22en-US%22%3E%3CP%3EHello%2C%20I%20tried%20putting%26nbsp%3BHostedAppHostNameOverride%20below%20Client%20Id%20and%20Client%20Secret%20tags%20in%20Web.%20Config%20file.%20But%20it%20didn't%20work%20as%20expected.%20List%20is%20still%20unable%20to%20trigger%20remote%20event%20receivers.%20Please%20advice.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-169384%22%20slang%3D%22en-US%22%3ERe%3A%20Invalid%20issuer%20o%20signature%20error%20in%20SPO%20Provider-Hosted%20AddIns%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-169384%22%20slang%3D%22en-US%22%3E%3CP%3EHaving%20the%20same%20issue.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIndeed%2C%20putting%20the%26nbsp%3B%3CSPAN%3EHostedAppHostNameOverride%20approach%20seems%20to%20be%20working%20as%20a%20temporary%20workaround.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-167705%22%20slang%3D%22en-US%22%3ERe%3A%20Invalid%20issuer%20o%20signature%20error%20in%20SPO%20Provider-Hosted%20AddIns%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-167705%22%20slang%3D%22en-US%22%3E%3CP%3ESame%20here.%20We%20managed%20to%20work%20around%20the%20error%20by%20specifying%20a%20HostedAppHostNameOverride%20app%20setting%20in%20our%20Application%20Settings.%20We%20found%20out%20that%20in%20TokenHelper's%26nbsp%3B%26nbsp%3BCreateAcsClientContextForUrl%20the%20call%20to%20OperationContext.Current.IncomingMessageHeaders.To.Host%20resolved%20in%20the%20wrong%20Host%20Name.%20In%20our%20case%20we%20expected%20%3CSTRONG%3Eourapplication.azurewebsites.net%3C%2FSTRONG%3E%20but%20only%20%3CSTRONG%3Eourapplication%3C%2FSTRONG%3E%20was%20returned.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-166622%22%20slang%3D%22en-US%22%3ERe%3A%20Invalid%20issuer%20o%20signature%20error%20in%20SPO%20Provider-Hosted%20AddIns%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-166622%22%20slang%3D%22en-US%22%3E%3CP%3EJan%2C%3C%2FP%3E%0A%3CP%3EOne%20additional%20question%20here%3A%20Did%20you%20have%20to%20create%20a%20new%20publishing%20profile%20for%20your%20AddIn%20when%20re-placing%20the%20ClientSecret%20with%20the%20one%20created%20with%20PowerShell%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-165805%22%20slang%3D%22en-US%22%3ERe%3A%20Invalid%20issuer%20o%20signature%20error%20in%20SPO%20Provider-Hosted%20AddIns%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-165805%22%20slang%3D%22en-US%22%3E%3CP%3EIt%20is%20important%20to%20note%20that%20we%20ran%20into%20this%20when%20creating%20new%20secrets%20for%20secrets%20that%20were%20about%20to%20expire.%20The%20normal%20procedure%20for%20replacing%20these%20secrets%20involves%20a%20secondary%20client%20secret%2C%20which%20allows%20for%20a%20switch%20over%20without%20interruption.%20Since%20the%20new%20client%20secrets%20where%20never%20accepted%2C%20in%20our%20experience%20things%20kept%20running%20until%20the%20switch%2C%20and%20then%20service%20breaks%20down%20with%20the%20invalid%20issuer%20message.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EUsing%20our%20procedure%2C%20recreating%20the%20app%20registration%2C%20the%26nbsp%3Bnew%20client%20secret%20is%20not%20immediately%20accepted.%20Something%20needs%20to%20propagate%20in%20the%20back-end.%20We've%20seen%20this%20take%20between%200.5%20and%204%20hours.%20During%20this%20time%20the%20invalid%20issuer%20token%20message%20was%20shown.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20the%20end%20it%20all%20comes%20down%20to%20a%20difference%20in%20client%20secrets%20and%20app%20principals%20that%20are%20created%20through%20the%20Create-MSOLServicePrincipal%20cmdlet%20(broken)%2C%20and%20those%20that%20are%20created%20through%20the%20AppRegNew.aspx%20page%20(works).%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-165703%22%20slang%3D%22en-US%22%3ERe%3A%20Invalid%20issuer%20o%20signature%20error%20in%20SPO%20Provider-Hosted%20AddIns%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-165703%22%20slang%3D%22en-US%22%3EEy%20Jan%2C%3CBR%20%2F%3EThanks!%20Do%20you%20mean%20that%20this%20workaround%20ended%20with%20your%20solutions%20working%20again%20after%20half%20an%20hour%3F%20What%20do%20you%20mean%20by%20service%20interruption%3F%3CBR%20%2F%3E%3CBR%20%2F%3EThanks%20again!!!%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-165697%22%20slang%3D%22en-US%22%3ERe%3A%20Invalid%20issuer%20o%20signature%20error%20in%20SPO%20Provider-Hosted%20AddIns%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-165697%22%20slang%3D%22en-US%22%3E%3CP%3EWe've%20run%20into%20the%20same%20issue%20in%20the%20last%20two%20months.%20Over%20each%20tenant%20we%20provide%20PH%20solutions%20in%20(8%20so%20far)%2C%20we%20see%20that%20renewed%20client%20secrets%20do%20not%20work%20with%20the%20invalid%20issuer%20error.%20We%20ran%20into%20a%20wall%20with%20support%2C%20so%20we%20figured%20we%20would%20wait%20until%20others%20started%20reporting%20this.%20Well%2C%20here%20we%20are%20%3A)%3C%2Fimg%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20a%20workaround%26nbsp%3Bwe%20use%20Remove-MSOLServicePrincipal%20(%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fpowershell%2Fmodule%2Fmsonline%2Fremove-msolserviceprincipal%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fpowershell%2Fmodule%2Fmsonline%2Fremove-msolserviceprincipal%3C%2FA%3E)%20to%20remove%20the%20registration%20and%20recreate%20it%20using%20the%20same%20Client%20ID%20on%20AppRegNew.aspx%20.%20When%20using%20the%20same%20client%20ID%20the%20granted%20permissions%20carry%20over.%20This%20gives%20a%20service%20interruption%20of%20half%20an%20hour%20to%20a%20couple%20of%20hours%2C%20but%20it's%20better%20then%20nothing.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-165241%22%20slang%3D%22en-US%22%3ERe%3A%20Invalid%20issuer%20o%20signature%20error%20in%20SPO%20Provider-Hosted%20AddIns%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-165241%22%20slang%3D%22en-US%22%3EHi%20Vesa!%3CBR%20%2F%3EI%20have%20already%20submitted%20the%20issue%3A%20%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2FSharePoint%2Fsp-dev-docs%2Fissues%2F1409%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fgithub.com%2FSharePoint%2Fsp-dev-docs%2Fissues%2F1409%3C%2FA%3E.%20Of%20course%2C%20we%20tried%20first%20to%20open%20a%20support%20ticket%20but%20support%20team%20told%20us%20that%20they%20didn't%20provide%20support%20to%20any%20issue%20related%20to%20third%20party%20development%20%3A-(.%20That's%20the%20reason%20I%20have%20decided%20to%20post%20here%20the%20problem%20and%20also%20at%20other%20channels%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-165208%22%20slang%3D%22en-US%22%3ERe%3A%20Invalid%20issuer%20o%20signature%20error%20in%20SPO%20Provider-Hosted%20AddIns%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-165208%22%20slang%3D%22en-US%22%3E%3CP%3ECan%20you%20open%20up%20an%20issue%20at%20the%20following%20location%20with%20the%20sufficient%20details%2C%20so%20that%20we%20can%26nbsp%3Bstart%20working%20on%26nbsp%3Bthis%20within%20the%20engineering%3F%20We%20use%20this%20issue%20list%20for%20tracking%20incoming%26nbsp%3Bissues%20around%20SharePoint%20development%20and%20issues%20are%20automatically%20synced%20to%20our%20VSO%20for%20internal%20tracking.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThanks%20for%20your%20submission%20advance%20-%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2FSharePoint%2Fsp-dev-docs%2Fissues%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fgithub.com%2FSharePoint%2Fsp-dev-docs%2Fissues%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20GitHub%20issue%20list%20is%20an%20alternative%20or%20add-on%20tool%20for%20opening%20up%20official%20support%20ticket%20through%20official%20channels%20with%20Premier%20support%20or%20with%20SPO%20Online%20support%2C%20which%20should%20be%20always%20the%20%231%20step%20for%20any%20unexpected%20issues%20so%20that%20things%20are%20getting%20tracked%20using%20official%20channels.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Juan Carlos González Martín
MVP

(Note: we have already verified that this is not a problem with expired client secrets)

Hi all, we are having problems with SPO Provider-Hosted Add-Ins were we are using remote event receivers...all of these Add-Ins were working last week, but have stopped working Today. Could you please help us with identifying what's happening? We are seeing the problem in 4-5 tenants and with 2-3 different applications. I have attached a document with the troubleshooting we have done and also our findings. As you can imagine, it's quite urgent for us to get information and a workaround about how to fix it...we also opened a support case, but support folks told us that they don't provide help for this kind of issues. Thanks in advance! cc @Vesa Juvonen

12 Replies

Can you open up an issue at the following location with the sufficient details, so that we can start working on this within the engineering? We use this issue list for tracking incoming issues around SharePoint development and issues are automatically synced to our VSO for internal tracking.

 

Thanks for your submission advance - https://github.com/SharePoint/sp-dev-docs/issues.

 

This GitHub issue list is an alternative or add-on tool for opening up official support ticket through official channels with Premier support or with SPO Online support, which should be always the #1 step for any unexpected issues so that things are getting tracked using official channels.

Hi Vesa!
I have already submitted the issue: https://github.com/SharePoint/sp-dev-docs/issues/1409. Of course, we tried first to open a support ticket but support team told us that they didn't provide support to any issue related to third party development :-(. That's the reason I have decided to post here the problem and also at other channels

We've run into the same issue in the last two months. Over each tenant we provide PH solutions in (8 so far), we see that renewed client secrets do not work with the invalid issuer error. We ran into a wall with support, so we figured we would wait until others started reporting this. Well, here we are :)

 

 

As a workaround we use Remove-MSOLServicePrincipal (https://docs.microsoft.com/en-us/powershell/module/msonline/remove-msolserviceprincipal) to remove the registration and recreate it using the same Client ID on AppRegNew.aspx . When using the same client ID the granted permissions carry over. This gives a service interruption of half an hour to a couple of hours, but it's better then nothing.

Ey Jan,
Thanks! Do you mean that this workaround ended with your solutions working again after half an hour? What do you mean by service interruption?

Thanks again!!!

It is important to note that we ran into this when creating new secrets for secrets that were about to expire. The normal procedure for replacing these secrets involves a secondary client secret, which allows for a switch over without interruption. Since the new client secrets where never accepted, in our experience things kept running until the switch, and then service breaks down with the invalid issuer message.

 

Using our procedure, recreating the app registration, the new client secret is not immediately accepted. Something needs to propagate in the back-end. We've seen this take between 0.5 and 4 hours. During this time the invalid issuer token message was shown.

 

In the end it all comes down to a difference in client secrets and app principals that are created through the Create-MSOLServicePrincipal cmdlet (broken), and those that are created through the AppRegNew.aspx page (works).

Jan,

One additional question here: Did you have to create a new publishing profile for your AddIn when re-placing the ClientSecret with the one created with PowerShell?

Highlighted

Same here. We managed to work around the error by specifying a HostedAppHostNameOverride app setting in our Application Settings. We found out that in TokenHelper's  CreateAcsClientContextForUrl the call to OperationContext.Current.IncomingMessageHeaders.To.Host resolved in the wrong Host Name. In our case we expected ourapplication.azurewebsites.net but only ourapplication was returned. 

 

 

 

 

Having the same issue.

 

Indeed, putting the HostedAppHostNameOverride approach seems to be working as a temporary workaround.

Hello, I tried putting HostedAppHostNameOverride below Client Id and Client Secret tags in Web. Config file. But it didn't work as expected. List is still unable to trigger remote event receivers. Please advice. 

Hello Rajat,

 

It did work for me, even for remote event receivers (at least the one being triggered when the add-in is being uninstalled).

 

The basic rule is to make sure that this value contains the text that is displayed to you in the error message "(...) is not the intended audience <important_text>". So you take the important_text value from your log message, strip if from the part before the "/" sign and the part after the "@" sign (see the content of TokenHelper.GetFormattedPrincipal method for details on what is going on there), and put it in the HostedAppHostNameOverride.

 

Also, as you've probably seen, the HostedAppHostNameOverride parameter can be a semicolon-separated-value, so you can put several values there.

 

Hope this helps.

Hello Slwomir 

 

Thanks for Replying, I have two questions. 

1) In order to deploy the apps on Azure and SharePoint Shall we need to have same login account for both ? 

Let's say my Login account for SharePoint is - rajat.chauhan@xyztst.onmicrosoft.com

And My login Id for Azure is - rajat.chauhan@xyz365.onmicrosoft.com  would it work ?

2) After adding the HostedAppHostNameOverride in application settings Do we need to generate new client ID and client secret to deploy apps ? 

 

Thank you in advance

Hi,

 

I have no idea about the deployment thing. For me it seems that it does not matter who makes the deployment - but I guess you just need to check it.

 

As for the client id and secret - I didn't have to re-generate anything, luckily.

 

 

Related Conversations
Tabs and Dark Mode
cjc2112 in Discussions on
46 Replies
Extentions Synchronization
Deleted in Discussions on
3 Replies
Stable version of Edge insider browser
HotCakeX in Discussions on
35 Replies
flashing a white screen while open new tab
Deleted in Discussions on
14 Replies
How to Prevent Teams from Auto-Launch
chenrylee in Microsoft Teams on
29 Replies
Security Community Webinars
Valon_Kolica in Security, Privacy & Compliance on
13 Replies