Skip to content

Commit 2f30722

Browse files
committed
clarification/typo fix
1 parent efaec68 commit 2f30722

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/active-directory/develop/msal-net-aad-b2c-considerations.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -24,16 +24,16 @@ ms.custom: aaddev
2424
You can use MSAL.NET to sign in users with social identities by using [Azure Active Directory B2C (Azure AD B2C)](https://aka.ms/aadb2c). Azure AD B2C is built around the notion of policies. In MSAL.NET, specifying a policy translates to providing an authority.
2525

2626
- When you instantiate the public client application, you need to specify the policy as part of the authority.
27-
- When you want to apply a policy, call an override of `AcquireTokenInteractive` that supplies the `authority` parameter.
27+
- When you want to apply a policy, call an override of `AcquireTokenInteractive` that accepts the `authority` parameter.
2828

2929
This article applies to MSAL.NET 3.x. For MSAL.NET 2.x, see [Azure AD B2C specifics in MSAL 2.x](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/wiki/AAD-B2C-Specifics-MSAL-2.x) in the MSAL.NET Wiki on GitHub.
3030

3131
## Authority for an Azure AD B2C tenant and policy
3232

3333
The authority format for Azure AD B2C is: `https://{azureADB2CHostname}/tfp/{tenant}/{policyName}`
3434

35-
- `azureADB2CHostname` - The name of the Azure AD B2C tenant plus the host. For example `{your-tenant-name}.b2clogin.com`.
36-
- `tenant` - The domain name or the directory (tenant) ID of the Azure AD B2C tenant. For example, `{your-tenant-name}.onmicrosoft.com` or a GUID, respectively.
35+
- `azureADB2CHostname` - The name of the Azure AD B2C tenant plus the host. For example, *contosob2c.b2clogin.com*.
36+
- `tenant` - The domain name or the directory (tenant) ID of the Azure AD B2C tenant. For example, *contosob2c.onmicrosoft.com* or a GUID, respectively.
3737
- `policyName` - The name of the user flow or custom policy to apply. For example, a sign-up/sign-in policy like *b2c_1_susi*.
3838

3939
For more information about Azure AD B2C authorities, see [Set redirect URLs to b2clogin.com](../../active-directory-b2c/b2clogin.md).
@@ -127,7 +127,7 @@ The ROPC flow is **not recommended** because asking a user for their password in
127127

128128
By using username/password in an ROPC flow, you sacrifice several things:
129129

130-
- Core tenets of modern identity: The password can be fished or replayed because the shared secret can be intercepted. By definitely, ROPC is incompatible with passwordless flows.
130+
- Core tenets of modern identity: The password can be fished or replayed because the shared secret can be intercepted. By definition, ROPC is incompatible with passwordless flows.
131131
- Users who need to do MFA won't be able to sign in (as there is no interaction).
132132
- Users won't be able to use single sign-on (SSO).
133133

@@ -146,7 +146,7 @@ AcquireTokenByUsernamePassword(
146146

147147
This `AcquireTokenByUsernamePassword` method takes the following parameters:
148148

149-
- The *scopes* to request an access token for.
149+
- The *scopes* for which to obtain an access token.
150150
- A *username*.
151151
- A SecureString *password* for the user.
152152

0 commit comments

Comments
 (0)