Skip to content

Commit 84fa5e7

Browse files
Merge pull request #87918 from DennisLee-DennisLee/v-dele-1592770
1592770: Localization fix and added missing periods.
2 parents 6984409 + 7aed664 commit 84fa5e7

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

articles/active-directory/develop/scenario-desktop-app-registration.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.devlang: na
1414
ms.topic: conceptual
1515
ms.tgt_pltfrm: na
1616
ms.workload: identity
17-
ms.date: 04/18/2019
17+
ms.date: 09/09/2019
1818
ms.author: jmprieur
1919
ms.custom: aaddev
2020
#Customer intent: As an application developer, I want to know how to write a Desktop app that calls web APIs using the Microsoft identity platform for developers.
@@ -27,35 +27,35 @@ This article contains the app registration specificities for a desktop applicati
2727

2828
## Supported accounts types
2929

30-
The account types supported in desktop application depend on the experience you want to light-up, and therefore on the flows you want to use.
30+
The account types supported in desktop application depend on the experience that you want to light up. Because of this relationship, the supported account types depend on the flows that you want to use.
3131

3232
### Audience for interactive token acquisition
3333

34-
If your desktop application uses interactive authentication, you can sign in users from any [account type](quickstart-register-app.md#register-a-new-application-using-the-azure-portal)
34+
If your desktop application uses interactive authentication, you can sign in users from any [account type](quickstart-register-app.md#register-a-new-application-using-the-azure-portal).
3535

3636
### Audience for desktop app silent flows
3737

38-
- If you intend to use Integrated Windows authentication or username/password, your application needs to sign in users in your own tenant (LOB developer), or in Azure Active directory organizations (ISV scenario). These authentication flows aren't supported for Microsoft personal accounts
39-
- If you want to use the Device code flow, you can't sign in users with their Microsoft personal accounts yet
38+
- To use Integrated Windows authentication or username/password, your application needs to sign in users in your own tenant (LOB developer), or in Azure Active directory organizations (ISV scenario). These authentication flows aren't supported for Microsoft personal accounts.
39+
- If you want to use the Device code flow, you can't sign in users with their Microsoft personal accounts yet.
4040
- If you sign in users with social identities passing a B2C authority and policy, you can only use the interactive and username-password authentication.
4141

4242
## Redirect URIs
4343

44-
Again the redirect URIs to use in desktop application will depend on the flow you want to use.
44+
The redirect URIs to use in desktop application will depend on the flow you want to use.
4545

46-
- If you're using the **interactive authentication** or **Device Code Flow**, you'll want to use `https://login.microsoftonline.com/common/oauth2/nativeclient`. You'll achieve this configuration by clicking the corresponding URL in the **Authentication** section for your application
46+
- If you're using the **interactive authentication** or **Device Code Flow**, you'll want to use `https://login.microsoftonline.com/common/oauth2/nativeclient`. You'll achieve this configuration by clicking the corresponding URL in the **Authentication** section for your application.
4747

4848
> [!IMPORTANT]
4949
> Today MSAL.NET uses another Redirect URI by default in desktop applications running on Windows (`urn:ietf:wg:oauth:2.0:oob`). In the future we'll want to change this default, and therefore we recommend that you use `https://login.microsoftonline.com/common/oauth2/nativeclient`
5050
51-
- If your app is only using Integrated Windows authentication, Username/Password, you don't need to register a redirect URI for your application. Indeed, these flows do a round trip to the Microsoft identity platform v2.0 endpoint and your application won't be called back on any specific URI.
52-
- In order to distinguish Device Code Flow, Integrated Windows Authentication and Username/Password from a confidential client application flow, which doesn't have redirect URIs either (the client credential flow used in daemon applications), you need to express that your application is a public client application. This configuration is achieved by going to the **Authentication** section for your application, and in the **Advanced settings** subsection, choose **Yes**, to the question **Treat application as a public client** (in the **Default client type** paragraph)
51+
- If your app is only using Integrated Windows authentication or username/password, you don't need to register a redirect URI for your application. These flows do a round trip to the Microsoft identity platform v2.0 endpoint, and your application won't be called back on any specific URI.
52+
- To distinguish Device Code Flow, Integrated Windows authentication, and username/password from a confidential client application flow that doesn't have redirect URIs either (the client credential flow used in daemon applications), you need to express that your application is a public client application. To achieve this configuration, go to the **Authentication** section for your application. Then, in the **Advanced settings** subsection, in the **Default client type** paragraph, choose **Yes** to the question **Treat application as a public client**.
5353

5454
![Allow public client](media/scenarios/default-client-type.png)
5555

5656
## API permissions
5757

58-
Desktop applications call APIs on behalf of the signed-in user. They need to request delegated permissions. They can't request application permissions (which are only handled in [daemon applications](scenario-daemon-overview.md))
58+
Desktop applications call APIs for the signed-in user. They need to request delegated permissions. However, they can't request application permissions, which are only handled in [daemon applications](scenario-daemon-overview.md).
5959

6060
## Next steps
6161

0 commit comments

Comments
 (0)