You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/msal-authentication-flows.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -65,7 +65,7 @@ In the following diagram, the application:
65
65
1. Requests an authorization code which was redeemed for an access token.
66
66
2. Uses the access token to call a web API, Microsoft Graph.
67
67
68
-

68
+

69
69
70
70
### Constraints for authorization code
71
71
@@ -90,7 +90,7 @@ In the following diagram, the application:
90
90
1. Acquires a token by using application secret or password credentials.
91
91
2. Uses the token to make requests of the resource.
92
92
93
-

93
+

94
94
95
95
### Certificates
96
96
@@ -99,7 +99,7 @@ In the following diagram, the application:
99
99
1. Acquires a token by using certificate credentials.
100
100
2. Uses the token to make requests of the resource.
101
101
102
-

102
+

103
103
104
104
These client credentials need to be:
105
105
@@ -121,7 +121,7 @@ In the following diagram:
121
121
1. Whenever user authentication is required, the app provides a code and asks the user to use another device like an internet-connected smartphone to visit a URL (for example, `https://microsoft.com/devicelogin`). The user is then prompted to enter the code, and proceeding through a normal authentication experience including consent prompts and [multi-factor authentication](../authentication/concept-mfa-howitworks.md), if necessary.
122
122
1. Upon successful authentication, the command-line app receives the required tokens through a back channel, and uses them to perform the web API calls it needs.
123
123
124
-

124
+

125
125
126
126
### Constraints for device code
127
127
@@ -157,7 +157,7 @@ In the following diagram:
157
157
3. When the client calls the web API, the web API requests another token on-behalf-of the user.
158
158
4. The protected web API uses this token to call a downstream web API on-behalf-of the user. The web API can also later request tokens for other downstream APIs (but still on behalf of the same user).
159
159
160
-

160
+

161
161
162
162
## Username/password (ROPC)
163
163
@@ -173,7 +173,7 @@ In the following diagram, the application:
173
173
1. Acquires a token by sending the username and password to the identity provider.
174
174
2. Calls a web API by using the token.
175
175
176
-

176
+

177
177
178
178
To acquire a token silently on Windows domain-joined machines, we recommend [integrated Windows authentication (IWA)](#integrated-windows-authentication-iwa) instead of ROPC. For other scenarios, use the [device code flow](#device-code).
179
179
@@ -201,7 +201,7 @@ In the following diagram, the application:
201
201
1. Acquires a token by using integrated Windows authentication.
202
202
2. Uses the token to make requests of the resource.
203
203
204
-

204
+

0 commit comments