OAuth Debugging
Step-by-step debugging for OAuth/SSO issues.
Redirect URI Mismatch
- Ensure URI exactly matches:
https://{region}.api.ecourtdate.com/oauth/{yoursignin}/redirect - Check for trailing slashes
- Protocol must be
https - Region must match your IDP profile configuration
Scope Errors
- Azure AD: Requires admin consent for
GroupMember.Read.All - Google: Requires domain-wide delegation for group directory scopes
- Okta: Include
groupsscope and configure groups claim in ID Token - All providers: Must include
openid,email,profileat minimum
Group Assignment Not Working
- Group name format must be
{AgencyReference}_ECOURTDATE(case-insensitive) - For Okta: Configure groups claim filter with regex
.*_ECOURTDATE - Verify users are actually members of the group in the IDP
- Use IDP token debugger to confirm groups claim is present in the token
User Gets Wrong Role
- Role names containing SECURITY, ADMIN, or ROOT (case-insensitive) are automatically elevated to Super Admin
- If unexpected, rename the role/group in your IDP
Provider-Specific Tips
- Azure AD: Check Azure Portal > App registrations > API permissions for consent status
- Google: Verify OAuth consent screen configuration in Google Cloud Console
- Okta: Check Application > Sign On > OpenID Connect ID Token > Groups claim type
- AWS Cognito: Check User Pool > App clients > Allowed OAuth Scopes
See also: OAuth Troubleshooting, OAuth Flows