diff --git a/docs/self-managed/components/management-identity/configuration/connect-to-an-oidc-provider.md b/docs/self-managed/components/management-identity/configuration/connect-to-an-oidc-provider.md
index 1b99cb5204e..68aa78c42e0 100644
--- a/docs/self-managed/components/management-identity/configuration/connect-to-an-oidc-provider.md
+++ b/docs/self-managed/components/management-identity/configuration/connect-to-an-oidc-provider.md
@@ -32,6 +32,7 @@ If you deploy Camunda 8 Self-Managed with Helm, use the [Helm chart authenticati
- Client secrets
- Audience
- A [claim name and value](/self-managed/components/management-identity/miscellaneous/configuration-variables.md#oidc-configuration) to use for initial access.
+- Your OIDC provider must issue access tokens that contain an `aud` (audience) claim matching the configured audience, as Camunda validates this claim for auth flows. Providers that are not configured to emit, or do not emit, the `aud` claim in their access tokens are not supported. Configure your identity provider to emit this claim if supported. See [known limitations](#oidc-provider-known-limitations) for details.
:::note
The steps below are a general approach for the Camunda components; it is important you reference the [component-specific
@@ -259,3 +260,15 @@ When using [Management Identity](/self-managed/components/management-identity/ov
| User profile management | Fetches user details from the UserInfo endpoint after authentication to personalize the user experience. |
|
To request a missing feature, please [contact us](/reference/contact.md).
+
+## OIDC provider known limitations
+
+Camunda requires the `aud` (audience) claim in JWT access tokens for authentication, including machine-to-machine (M2M) flows. The claim must match the configured audience (see [RFC 7519](https://datatracker.ietf.org/doc/html/rfc7519#section-4.1.3)).
+
+OIDC providers that do not include the `aud` claim in access tokens issued via the OAuth 2.0 Client Credentials flow are not compatible with Camunda for M2M authentication.
+
+### AWS Cognito
+
+AWS Cognito does not include the `aud` claim in Client Credentials access tokens, using `client_id` instead. Camunda rejects these tokens with errors such as `Token audiences are [], expected at least one of [...]`, resulting in `UNAUTHENTICATED` errors for Connectors and other M2M clients. Cognito is not currently supported for M2M authentication.
+
+For tracking and updates, see [camunda/camunda#44650](https://github.com/camunda/camunda/issues/44650).
diff --git a/versioned_docs/version-8.8/self-managed/components/management-identity/configuration/connect-to-an-oidc-provider.md b/versioned_docs/version-8.8/self-managed/components/management-identity/configuration/connect-to-an-oidc-provider.md
index c6ecc8e2c55..9e12812d4df 100644
--- a/versioned_docs/version-8.8/self-managed/components/management-identity/configuration/connect-to-an-oidc-provider.md
+++ b/versioned_docs/version-8.8/self-managed/components/management-identity/configuration/connect-to-an-oidc-provider.md
@@ -32,6 +32,7 @@ If you deploy Camunda 8 Self-Managed with Helm, use the [Helm chart authenticati
- Client secrets
- Audience
- A [claim name and value](/self-managed/components/management-identity/miscellaneous/configuration-variables.md#oidc-configuration) to use for initial access.
+- Your OIDC provider must issue access tokens that contain an `aud` (audience) claim matching the configured audience, as Camunda validates this claim for auth flows. Providers that are not configured to emit, or do not emit, the `aud` claim in their access tokens are not supported. Configure your identity provider to emit this claim if supported. See [known limitations](#oidc-provider-known-limitations) for details.
:::note
The steps below are a general approach for the Camunda components; it is important you reference the [component-specific
@@ -259,3 +260,15 @@ When using [Management Identity](/self-managed/components/management-identity/ov
| User profile management | Fetches user details from the UserInfo endpoint after authentication to personalize the user experience. |
|
To request a missing feature, please [contact us](/reference/contact.md).
+
+## OIDC provider known limitations
+
+Camunda requires the `aud` (audience) claim in JWT access tokens for authentication, including machine-to-machine (M2M) flows. The claim must match the configured audience (see [RFC 7519](https://datatracker.ietf.org/doc/html/rfc7519#section-4.1.3)).
+
+OIDC providers that do not include the `aud` claim in access tokens issued via the OAuth 2.0 Client Credentials flow are not compatible with Camunda for M2M authentication.
+
+### AWS Cognito
+
+AWS Cognito does not include the `aud` claim in Client Credentials access tokens, using `client_id` instead. Camunda rejects these tokens with errors such as `Token audiences are [], expected at least one of [...]`, resulting in `UNAUTHENTICATED` errors for Connectors and other M2M clients. Cognito is not currently supported for M2M authentication.
+
+For tracking and updates, see [camunda/camunda#44650](https://github.com/camunda/camunda/issues/44650).