Skip to content

Commit 945d714

Browse files
Adding periods to alt-text
1 parent 757589a commit 945d714

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/active-directory/develop/msal-authentication-flows.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ In the following diagram, the application:
6565
1. Requests an authorization code which was redeemed for an access token.
6666
2. Uses the access token to call a web API, Microsoft Graph.
6767

68-
![Diagram of authorization code flow](media/msal-authentication-flows/authorization-code.png)
68+
![Diagram of authorization code flow.](media/msal-authentication-flows/authorization-code.png)
6969

7070
### Constraints for authorization code
7171

@@ -90,7 +90,7 @@ In the following diagram, the application:
9090
1. Acquires a token by using application secret or password credentials.
9191
2. Uses the token to make requests of the resource.
9292

93-
![Diagram of confidential client with password](media/msal-authentication-flows/confidential-client-password.png)
93+
![Diagram of confidential client with password.](media/msal-authentication-flows/confidential-client-password.png)
9494

9595
### Certificates
9696

@@ -99,7 +99,7 @@ In the following diagram, the application:
9999
1. Acquires a token by using certificate credentials.
100100
2. Uses the token to make requests of the resource.
101101

102-
![Diagram of confidential client with cert](media/msal-authentication-flows/confidential-client-certificate.png)
102+
![Diagram of confidential client with cert.](media/msal-authentication-flows/confidential-client-certificate.png)
103103

104104
These client credentials need to be:
105105

@@ -121,7 +121,7 @@ In the following diagram:
121121
1. Whenever user authentication is required, the app provides a code and asks the user to use another device like an internet-connected smartphone to visit a URL (for example, `https://microsoft.com/devicelogin`). The user is then prompted to enter the code, and proceeding through a normal authentication experience including consent prompts and [multi-factor authentication](../authentication/concept-mfa-howitworks.md), if necessary.
122122
1. Upon successful authentication, the command-line app receives the required tokens through a back channel, and uses them to perform the web API calls it needs.
123123

124-
![Diagram of device code flow](media/msal-authentication-flows/device-code.png)
124+
![Diagram of device code flow.](media/msal-authentication-flows/device-code.png)
125125

126126
### Constraints for device code
127127

@@ -157,7 +157,7 @@ In the following diagram:
157157
3. When the client calls the web API, the web API requests another token on-behalf-of the user.
158158
4. The protected web API uses this token to call a downstream web API on-behalf-of the user. The web API can also later request tokens for other downstream APIs (but still on behalf of the same user).
159159

160-
![Diagram of on-behalf-of flow](media/msal-authentication-flows/on-behalf-of.png)
160+
![Diagram of on-behalf-of flow.](media/msal-authentication-flows/on-behalf-of.png)
161161

162162
## Username/password (ROPC)
163163

@@ -173,7 +173,7 @@ In the following diagram, the application:
173173
1. Acquires a token by sending the username and password to the identity provider.
174174
2. Calls a web API by using the token.
175175

176-
![Diagram of the username/password flow](media/msal-authentication-flows/username-password.png)
176+
![Diagram of the username/password flow.](media/msal-authentication-flows/username-password.png)
177177

178178
To acquire a token silently on Windows domain-joined machines, we recommend [integrated Windows authentication (IWA)](#integrated-windows-authentication-iwa) instead of ROPC. For other scenarios, use the [device code flow](#device-code).
179179

@@ -201,7 +201,7 @@ In the following diagram, the application:
201201
1. Acquires a token by using integrated Windows authentication.
202202
2. Uses the token to make requests of the resource.
203203

204-
![Diagram of integrated Windows authentication](media/msal-authentication-flows/integrated-windows-authentication.png)
204+
![Diagram of integrated Windows authentication.](media/msal-authentication-flows/integrated-windows-authentication.png)
205205

206206
### Constraints for IWA
207207

0 commit comments

Comments
 (0)