Skip to content

Commit aea0f77

Browse files
authored
Merge pull request #1920 from SavSanta/patch-1
Update application-delegated-permission-access-tokens-identity-platfo…
2 parents 2a02d1c + 9e5e1a6 commit aea0f77

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

support/entra/entra-id/app-integration/application-delegated-permission-access-tokens-identity-platform.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Delegated permission tokens can only be obtained from the following flows:
3434
* [Authorization code grant flow](/azure/active-directory/develop/v2-oauth2-auth-code-flow)
3535
* [On-Behalf-Of flow](/azure/active-directory/develop/v2-oauth2-on-behalf-of-flow)
3636
* [Device authorization grant flow](/azure/active-directory/develop/v2-oauth2-device-code)
37-
* [Resource Owner Password Credentials grant flow](/azure/active-directory/develop/v2-oauth2-device-code)
37+
* [Resource Owner Password Credentials grant flow](/entra/identity-platform/v2-oauth-ropc)
3838

3939
## Identify the permission type for an access token
4040

@@ -86,4 +86,4 @@ Users often encounter issues when their applications call Microsoft Graph REST e
8686
* Verify if the endpoint supports delegated permissions, application permissions, or both.
8787
* Verify that the access token has the correct permissions to call the endpoint.
8888

89-
[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)]
89+
[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)]

0 commit comments

Comments
 (0)