Skip to content

Commit 1ca6a93

Browse files
authored
update guidance for validating appid/azp
Our guidance for validating appid/azp was lacking verbosity, which led to some partner confusion. I added some expanded details to resolve that confusion. ------- cc: @davidmu1
1 parent 15ee69e commit 1ca6a93

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/active-directory/develop/access-tokens.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -270,7 +270,9 @@ Your application's business logic will dictate this step, some common authorizat
270270
#### Validate that the application that signed in the user has permission to access this data
271271

272272
* Use the `scp` claim to validate that the user has granted the calling app permission to call your API.
273-
* Ensure the calling client is allowed to call your API using the `appid` claim.
273+
* Ensure the calling client is allowed to call your API using the `appid` claim (for v1.0 tokens) or the `azp` claim (for v2.0 tokens).
274+
* You only need to validate these claims if you want your web API to be called by pre-determined applications. For instance, line-of-business applications or web API's called by well-known frontends should validate `appid`/`azp`, but ISV web API's which are called directly by customers should not.
275+
274276

275277
## User and application tokens
276278

0 commit comments

Comments
 (0)