Issuer URL for MS Teams bot framework

S, Carol 0 Reputation points
2025-11-17T13:17:28.5466667+00:00

I'm migrating our Kyma APIRule configuration from v1beta1 to v2, and v2 requires an explicit issuer URL that must exactly match the iss claim inside the access tokens issued by the Bot Framework.

Could you please confirm the exact issuer URL (including trailing slash, if required) that Bot Framework uses in the access tokens for requests sent to my bot?

Been following this document: https://learn.microsoft.com/en-us/azure/bot-service/rest-api/bot-framework-rest-connector-authentication?view=azure-bot-service-4.0&tabs=multitenant#connector-to-bot.
But my issuer is "issuer": "https://api.botframework.com"
but when I decode my JWT its

"iss": "https://sts.windows.net/d6d49420-f39b-4df7-a1dc-d59a935871db/"

This is required because Kyma APIRule v2 returns: “Jwt issuer is not configured” when the configured issuer does not exactly match the token’s iss claim.

Can you please provide the correct issuer value and the corresponding JWKS URL?

Thank you!

Microsoft Teams | Development
Microsoft Teams | Development
Building, integrating, or customizing apps and workflows within Microsoft Teams using developer tools and APIs
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. Kudos-Ng 10,385 Reputation points Microsoft External Staff Moderator
    2025-11-17T14:01:03+00:00

    Hi S, Carol,

    Thank you for posting your question in the Microsoft Q&A forum. 

    After reviewing your description and the linked documentation, I’d like to provide the following information:

    The iss claim in Bot Framework access tokens is issued by Azure Active Directory, not by https://api.botframework.com. The correct issuer value is: https://sts.windows.net/<tenant-id>/

    This matches what you observed in your decoded JWT. The https://api.botframework.com value corresponds to the audience (aud claim), not the issuer.

    For JWKS (public keys) to validate the token signature, use: https://login.microsoftonline.com/<tenant-id>/discovery/v2.0/keysor, for multi-tenant scenarios: https://login.microsoftonline.com/common/discovery/v2.0/keys

    Ensure your Kyma APIRule v2 configuration uses the exact issuer value from the token, including the trailing slash, to avoid the “Jwt issuer is not configured” error.

    Hope this information helpful.


    If the answer is helpful, please click "Accept Answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".

    Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.


Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.