A cloud-based identity and access management service for securing user authentication and resource access
- The provided information only states that Azure AD B2C supports SAML SP-initiated and IdP-initiated flows and SAML-based SLO, but does not describe any behavior about preserving
RelayStateor arbitrary query parameters on SLO responses back to the SP. The context does not confirm whether B2C preserves or dropsRelayStateor other passback parameters during SAML SLO. - The context does not contain any information about changes in SAML SLO behavior over time or about specific custom policy updates that would alter how the SLO response is constructed.
- The context does not document any mechanism in custom policies to echo arbitrary passback parameters on SLO responses (for example via
RelayStatemapping or custom claims) for SAML SLO. It only shows how to configure SAML SP applications (reply URL, logout URL) and how to troubleshoot SAML protocol messages using browser tools.
Given the available information, the only concrete guidance is to use SAML tracing tools (such as SAML DevTools, SAML-tracer, or browser dev tools) to inspect the actual SAMLRequest/SAMLResponse and confirm what, if anything, is being sent as RelayState or equivalent during the SLO round-trip, and to verify the SAML application’s configured logout URL in the B2C application registration.
References: