Skip to content

Commit 8da32ca

Browse files
authored
Merge pull request #50559 from bpcastilho/patch-3
Update authentication-scenarios.md
2 parents c6a16bf + 26793bb commit 8da32ca

File tree

1 file changed

+17
-0
lines changed

1 file changed

+17
-0
lines changed

articles/active-directory/develop/authentication-scenarios.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -74,6 +74,23 @@ Tokens are only valid for a limited amount of time. Usually the STS provides a p
7474

7575
Access tokens are passed to a Web API as the bearer token in the `Authorization` header. An app can provide a refresh token to the STS, and if the user access to the app wasn't revoked, it will get back a new access token and a new refresh token. This is how the scenario of someone leaving the enterprise is handled. When the STS receives the refresh token, it won't issue another valid access token if the user is no longer authorized.
7676

77+
### How each flow emits tokens and codes
78+
79+
Depending on how your client is built, it can use one (or several) of the authentication flows supported by Azure AD. These flows can produce a variety of tokens (id_tokens, refresh tokens, access tokens) as well as authorization codes, and require different tokens to make them work. This chart provides an overview:
80+
81+
|Flow | Requires | id_token | access token | refresh token | authorization code |
82+
|-----|----------|----------|--------------|---------------|--------------------|
83+
|[Authorization code flow](v2-oauth2-auth-code-flow.md) | | x | x | x | x|
84+
|[Implicit flow](v2-oauth2-implicit-grant-flow.md) | | x | x | | |
85+
|[Hybrid OIDC flow](v2-protocols-oidc.md#get-access-tokens)| | x | | | x |
86+
|[Refresh token redemption](v2-oauth2-auth-code-flow.md#refreshing-the-access-tokens) | refresh token | x | x | x| |
87+
|[On-behalf-of flow](v2-oauth2-on-behalf-of-flow.md) | access token| x| x| x| |
88+
|[Client credentials](v2-oauth2-client-creds-grant-flow.md) | | | x (app-only)| | |
89+
90+
Tokens issued via the implicit mode have a length limitation due to being passed back to the browser via the URL (where `response_mode` is `query` or `fragment`). Some browsers have a limit on the size of the URL that can be put in the browser bar and fail when it is too long. Thus, these tokens do not have `groups` or `wids` claims.
91+
92+
Now that you have an overview of the basics, read on to understand the identity app model and API, learn how provisioning works in Azure AD, and get links to detailed information about common scenarios Azure AD supports.
93+
7794
## Application model
7895

7996
Applications can sign in users themselves or delegate sign-in to an identity provider. See [Authentication flows and app scenarios](authentication-flows-app-scenarios.md) to learn about sign-in scenarios supported by Azure AD.

0 commit comments

Comments
 (0)