Skip to content

Commit 757589a

Browse files
authored
update from reviews
1 parent c9ad101 commit 757589a

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/active-directory/develop/msal-authentication-flows.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ The Microsoft Authentication Library (MSAL) supports several authorization grant
2222

2323
| Authentication flow | Enables | Supported application types |
2424
|-----------------------------------------------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
25-
| [Authorization code](#authorization-code) | User sign-in and access to web APIs on behalf of the user. | * [Desktop](scenario-desktop-overview.md) <br /> * [Mobile](scenario-mobile-overview.md) <br /> * [Single-page app (SPA)](scenario-spa-overview.md) (requires PKCE) <br /> * [Web](scenario-web-app-call-api-overview.md) |
25+
| [Authorization code](#authorization-code) | User sign-in and access to web APIs on behalf of the user. | [Desktop](scenario-desktop-overview.md) <br /> [Mobile](scenario-mobile-overview.md) <br /> [Single-page app (SPA)](scenario-spa-overview.md) (requires PKCE) <br /> [Web](scenario-web-app-call-api-overview.md) |
2626
| [Client credentials](#client-credentials) | Access to web APIs by using the identity of the application itself. Typically used for server-to-server communication and automated scripts requiring no user interaction. | [Daemon](scenario-daemon-overview.md) |
2727
| [Device code](#device-code) | User sign-in and access to web APIs on behalf of the user on input-constrained devices like smart TVs and IoT devices. Also used by command line interface (CLI) applications. | [Desktop, Mobile](scenario-desktop-acquire-token-device-code-flow.md) |
2828
| [Implicit grant](#implicit-grant) | User sign-in and access to web APIs on behalf of the user. _The implicit grant flow is no longer recommended - use authorization code with PKCE instead._ | * [Single-page app (SPA)](scenario-spa-overview.md) <br /> * [Web](scenario-web-app-call-api-overview.md) |
@@ -62,7 +62,7 @@ When users sign in to web applications, the application receives an authorizatio
6262

6363
In the following diagram, the application:
6464

65-
1. Requests an authorization code which redeemed for an access token.
65+
1. Requests an authorization code which was redeemed for an access token.
6666
2. Uses the access token to call a web API, Microsoft Graph.
6767

6868
![Diagram of authorization code flow](media/msal-authentication-flows/authorization-code.png)
@@ -71,7 +71,7 @@ In the following diagram, the application:
7171

7272
- Single-page applications require *Proof Key for Code Exchange* (PKCE) when using the authorization code grant flow. PKCE is supported by MSAL.
7373

74-
- The OAuth 2.0 specification requires you use an authorization code to redeem an access token only _once_.
74+
- The OAuth 2.0 specification requires you to use an authorization code to redeem an access token only _once_.
7575

7676
If you attempt to acquire access token multiple times with the same authorization code, an error similar to the following is returned by the Microsoft identity platform. Some libraries and frameworks request the authorization code for you automatically, and requesting a code manually in such cases will also result in this error.
7777

@@ -85,13 +85,13 @@ The client credentials grant flow permits a web service (a confidential client)
8585

8686
### Application secrets
8787

88-
![Diagram of confidential client with password](media/msal-authentication-flows/confidential-client-password.png)
89-
90-
In the preceding diagram, the application:
88+
In the following diagram, the application:
9189

9290
1. Acquires a token by using application secret or password credentials.
9391
2. Uses the token to make requests of the resource.
9492

93+
![Diagram of confidential client with password](media/msal-authentication-flows/confidential-client-password.png)
94+
9595
### Certificates
9696

9797
In the following diagram, the application:

0 commit comments

Comments
 (0)