Skip to content

Commit 94edff3

Browse files
Fixed the loc bug and added missing punctuation.
1 parent b36c710 commit 94edff3

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/active-directory/develop/scenario-desktop-app-registration.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -27,35 +27,35 @@ This article contains the app registration specificities for a desktop applicati
2727

2828
## Supported accounts types
2929

30-
The account types supported in desktop application depend on the experience you want to light-up, and therefore on the flows you want to use.
30+
The account types supported in desktop application depend on the experience that you want to light up. Because of this relationship, the supported account types depend on the flows that you want to use.
3131

3232
### Audience for interactive token acquisition
3333

34-
If your desktop application uses interactive authentication, you can sign in users from any [account type](quickstart-register-app.md#register-a-new-application-using-the-azure-portal)
34+
If your desktop application uses interactive authentication, you can sign in users from any [account type](quickstart-register-app.md#register-a-new-application-using-the-azure-portal).
3535

3636
### Audience for desktop app silent flows
3737

38-
- If you intend to use Integrated Windows authentication or username/password, your application needs to sign in users in your own tenant (LOB developer), or in Azure Active directory organizations (ISV scenario). These authentication flows aren't supported for Microsoft personal accounts
39-
- If you want to use the Device code flow, you can't sign in users with their Microsoft personal accounts yet
38+
- If you intend to use Integrated Windows authentication or username/password, your application needs to sign in users in your own tenant (LOB developer), or in Azure Active directory organizations (ISV scenario). These authentication flows aren't supported for Microsoft personal accounts.
39+
- If you want to use the Device code flow, you can't sign in users with their Microsoft personal accounts yet.
4040
- If you sign in users with social identities passing a B2C authority and policy, you can only use the interactive and username-password authentication.
4141

4242
## Redirect URIs
4343

4444
Again the redirect URIs to use in desktop application will depend on the flow you want to use.
4545

46-
- If you're using the **interactive authentication** or **Device Code Flow**, you'll want to use `https://login.microsoftonline.com/common/oauth2/nativeclient`. You'll achieve this configuration by clicking the corresponding URL in the **Authentication** section for your application
46+
- If you're using the **interactive authentication** or **Device Code Flow**, you'll want to use `https://login.microsoftonline.com/common/oauth2/nativeclient`. You'll achieve this configuration by clicking the corresponding URL in the **Authentication** section for your application.
4747

4848
> [!IMPORTANT]
4949
> Today MSAL.NET uses another Redirect URI by default in desktop applications running on Windows (`urn:ietf:wg:oauth:2.0:oob`). In the future we'll want to change this default, and therefore we recommend that you use `https://login.microsoftonline.com/common/oauth2/nativeclient`
5050
5151
- If your app is only using Integrated Windows authentication, Username/Password, you don't need to register a redirect URI for your application. Indeed, these flows do a round trip to the Microsoft identity platform v2.0 endpoint and your application won't be called back on any specific URI.
52-
- In order to distinguish Device Code Flow, Integrated Windows Authentication and Username/Password from a confidential client application flow, which doesn't have redirect URIs either (the client credential flow used in daemon applications), you need to express that your application is a public client application. This configuration is achieved by going to the **Authentication** section for your application, and in the **Advanced settings** subsection, choose **Yes**, to the question **Treat application as a public client** (in the **Default client type** paragraph)
52+
- In order to distinguish Device Code Flow, Integrated Windows Authentication and Username/Password from a confidential client application flow, which doesn't have redirect URIs either (the client credential flow used in daemon applications), you need to express that your application is a public client application. This configuration is achieved by going to the **Authentication** section for your application, and in the **Advanced settings** subsection, choose **Yes**, to the question **Treat application as a public client** (in the **Default client type** paragraph).
5353

5454
![Allow public client](media/scenarios/default-client-type.png)
5555

5656
## API permissions
5757

58-
Desktop applications call APIs on behalf of the signed-in user. They need to request delegated permissions. They can't request application permissions (which are only handled in [daemon applications](scenario-daemon-overview.md))
58+
Desktop applications call APIs on behalf of the signed-in user. They need to request delegated permissions. They can't request application permissions (which are only handled in [daemon applications](scenario-daemon-overview.md)).
5959

6060
## Next steps
6161

0 commit comments

Comments
 (0)