Skip to content

Commit 56b0f19

Browse files
nickludwigiambmelt
andauthored
revise in accordance with comments
Co-authored-by: Brian Melton-Grace <[email protected]>
1 parent 1ca6a93 commit 56b0f19

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/active-directory/develop/access-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -271,7 +271,7 @@ Your application's business logic will dictate this step, some common authorizat
271271

272272
* Use the `scp` claim to validate that the user has granted the calling app permission to call your API.
273273
* Ensure the calling client is allowed to call your API using the `appid` claim (for v1.0 tokens) or the `azp` claim (for v2.0 tokens).
274-
* You only need to validate these claims if you want your web API to be called by pre-determined applications. For instance, line-of-business applications or web API's called by well-known frontends should validate `appid`/`azp`, but ISV web API's which are called directly by customers should not.
274+
* You only need to validate these claims (`appid`, `azp`) if you want to restrict your web API to be called only by pre-determined applications (e.g., line-of-business applications or web APIs called by well-known frontends). APIs intended to allow access from any calling application do not need to validate these claims.
275275

276276

277277
## User and application tokens

0 commit comments

Comments
 (0)