Skip to content

Commit 700b53d

Browse files
committed
apply editing changes
1 parent 25f73f7 commit 700b53d

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

support/entra/entra-id/app-integration/error-code-aadsts50000-issuing-token-sign-in-service.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -23,11 +23,11 @@ This issue is common in hybrid environments. The user's federated account passwo
2323

2424
### Solution for cause 1
2525

26-
Reset the user password, and then verify the new password can authenticate successfully to Microsoft Entra ID.
26+
Reset the user password, and then verify the new password can successfully authenticate to Microsoft Entra ID.
2727

2828
## Cause 2: Parameters are incorrectly configured in the token acquisition request
2929

30-
The issue commonly occurs in the on-behalf-of (OBO) flow. Certain parameters required for token acquisition may be missing or invalid.
30+
This commonly occurs in the on-behalf-of (OBO) flow. Certain parameters required for token acquisition may be missing or invalid.
3131

3232
### Solution for cause 2
3333

@@ -37,7 +37,7 @@ Make sure the client ID is valid and other required parameters are configured co
3737

3838
This issue can occur in an OAuth2 Device code grant flow to the token endpoint. After the user signs in to a browser window and accepts the consent dialog, this error occurs.
3939

40-
### Solution 3 for cause 3: verify application consent settings
40+
### Solution 3 for cause 3: Verify application consent settings
4141

4242
1. Go to the [Azure portal](https://portal.azure.com), make sure that the client application (Service Principal) exists in the tenant's **Enterprise Applications** page. You can search for the application by App ID.
4343
2. Verify that the user has the ability to consent to the application. Check user settings in the **Enterprise Applications** page or review relevant policies affecting user consent.
@@ -52,7 +52,7 @@ Microsoft Identity Platform (v2 endpoint) tokens must be signed by a certificate
5252

5353
1. In the Azure portal, go to the **App Registrations**.
5454
2. In the **Manage** section, select **Manifest**.
55-
3. Check if there is an entry in the `keyCredentials` section with `type=Symmetric` and `usage=Sign`.
55+
3. Check if there is an entry exists in the `keyCredentials` section with `type=Symmetric` and `usage=Sign`.
5656

5757
:::image type="content" source="./media/error-code-aadsts50000-issuing-token-sign-in-service/manifest-sample.png" alt-text="Application Manifest Key Credentials" lightbox="/media/error-code-aadsts50000-issuing-token-sign-in-service/manifest-sample.png":::
5858

@@ -66,7 +66,7 @@ Alternatively, use the AzureAD PowerShell cmdlet [Get-AzureADApplicationKeyCrede
6666

6767
#### Step 3: Remove symmetric signing key
6868

69-
If the symmetric key exits, use:
69+
If the symmetric key exists, use:
7070

7171
- [Remove-AzureADApplicationKeyCredential](/powershell/module/azuread/remove-azureadapplicationkeycredential) to remove the symmetric key for the app registration.
7272
- [Remove-AzureADServicePrincipalKeyCredential](/powershell/module/azuread/remove-azureadserviceprincipalkeycredential) to remove the symmetric key for the service principal object.
@@ -79,8 +79,8 @@ This error can occur in the following scenario:
7979

8080
- You have a multitenant resource application registered in tenant A. This application exposes only **Application Permission** type.
8181
- In a different tenant B, you have a client application registered. In the **API permission** page for this application, you configure the permission for the resource application registered in the other tenant.
82-
- Then, you use an OAuth2.0 On-Behalf-Of (delegation) flow to request an access token for the resource app with the `/.default` for the web API scope.
82+
- Then, you use an OAuth 2.0 On-Behalf-Of (delegation) flow to request an access token for the resource app with the `/.default` for the web API scope.
8383

8484
### Solution for cause 5
8585

86-
Configure the resource application to expose delegated permission and consent to that delegated permission in the client application.
86+
Configure the resource application to expose the delegated permission and consent to that delegated permission in the client application.

0 commit comments

Comments
 (0)