Skip to content

Commit b2ddc4f

Browse files
committed
edit pass: v2-supported-account-types
1 parent d83fd0e commit b2ddc4f

File tree

1 file changed

+23
-22
lines changed

1 file changed

+23
-22
lines changed
Lines changed: 23 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Supported accounts types - Microsoft identity platform | Azure
2+
title: Supported account types - Microsoft identity platform | Azure
33
description: Conceptual documentation about audiences and supported account types in applications
44
services: active-directory
55
author: jmprieur
@@ -17,39 +17,40 @@ ms.custom: aaddev, identityplatformtop40
1717

1818
# Supported account types
1919

20-
This article explains what accounts types (sometimes named audiences) are supported in applications.
20+
This article explains what account types (sometimes called audiences) are supported in Microsoft identity platform applications.
2121

2222
<!-- This section can be in an include for many of the scenarios (SPA, web app signing-in users, protecting a web API, Desktop (depending on the flows), Mobile -->
2323

24-
## Supported accounts types in Microsoft Identity platform applications
24+
## Account types in the public cloud
2525

26-
In the Microsoft Azure public Cloud, most types of apps can sign in users with any audience:
26+
In the Microsoft Azure public cloud, most types of apps can sign in users with any audience:
2727

28-
- If you're writing a Line of Business (LOB) application, you can sign in users in your own organization. Such an application is sometimes named **single tenant**.
29-
- If you're an ISV, you can write an application which signs-in users:
28+
- If you're writing a line-of-business (LOB) application, you can sign in users in your own organization. Such an application is sometimes called *single-tenant*.
29+
- If you're an ISV, you can write an application that signs in users:
3030

31-
- In any organization. Such an application is named a **multi-tenant** web application. You'll sometimes read that it signs-in users with their work or school accounts.
32-
- With their work or school or personal Microsoft account.
33-
- With only personal Microsoft account.
34-
> [!NOTE]
35-
> Currently the Microsoft identity platform supports personal Microsoft accounts only by registering an app for **work or school or Microsoft personal accounts**, and then, restrict sign-in in the code for the application by specifying an Azure AD authority, when building the application, such as `https://login.microsoftonline.com/consumers`.
31+
- In any organization. Such an application is called a *multitenant* web application. You'll sometimes read that it signs in users with their work or school accounts.
32+
- With their work or school or personal Microsoft accounts.
33+
- With only personal Microsoft accounts.
34+
35+
> [!NOTE]
36+
> Currently, the Microsoft identity platform supports personal Microsoft accounts only. You first register an app for **work or school or Microsoft personal accounts**. Then you restrict sign-in in the code for the application by specifying an Azure Active Directory (Azure AD) authority when building the application, such as `https://login.microsoftonline.com/consumers`.
3637
37-
- If you're writing a business to consumers application, you can also sign in users with their social identities, using Azure AD B2C.
38+
- If you're writing a business-to-consumer application, you can also sign in users with their social identities, by using Azure AD B2C.
3839

39-
## Certain authentication flows don't support all the account types
40+
## Variances with authentication flows
4041

41-
Some account types can't be used with certain authentication flows. For instance, in desktop, UWP applications, or daemon applications:
42+
Some account types can't be used with certain authentication flows. For instance, in desktop, UWP, or daemon applications:
4243

43-
- Daemon applications can only be used with Azure Active Directory organizations. It doesn't make sense to attempt to use daemon applications to manipulate Microsoft personal accounts (the admin consent will never be granted).
44-
- You can only use the Integrated Windows Authentication flow with work or school accounts (in your organization or any organization). Indeed, Integrated Windows Authentication works with domain accounts, and requires the machines to be domain joined or Azure AD joined. This flow doesn't make sense for personal Microsoft Accounts.
45-
- The [Resource Owner Password Grant](./v2-oauth-ropc.md) (Username/Password), can't be used with personal Microsoft accounts. Indeed, personal Microsoft accounts require that the user consents to accessing personal resources at each sign-in session. That's why, this behavior isn't compatible with non-interactive flows.
46-
- Device code flow doesn't yet work with personal Microsoft accounts.
44+
- Daemon applications can be used only with Azure AD organizations. It doesn't make sense to try to use daemon applications to manipulate Microsoft personal accounts. The admin consent will never be granted.
45+
- You can use the Integrated Windows Authentication flow only with work or school accounts (in your organization or any organization). Integrated Windows Authentication works with domain accounts, it and requires the machines to be domain joined or Azure AD joined. This flow doesn't make sense for personal Microsoft accounts.
46+
- The [Resource Owner Password Credentials grant](./v2-oauth-ropc.md) (username/password) can't be used with personal Microsoft accounts. Personal Microsoft accounts require that the user consents to accessing personal resources at each sign-in session. That's why this behavior isn't compatible with non-interactive flows.
47+
- Device code flow doesn't work with personal Microsoft accounts.
4748

48-
## Supported account types in national clouds
49+
## Account types in national clouds
4950

50-
Apps can also sign in users in [national clouds](authentication-national-cloud.md). However, Microsoft personal accounts aren't supported in these clouds (by definition of these clouds). That's why the supported account types are reduced, for these clouds, to your organization (single tenant) or any organizations (multi-tenant applications).
51+
Apps can also sign in users in [national clouds](authentication-national-cloud.md). However, Microsoft personal accounts aren't supported in these clouds. That's why the supported account types are reduced, for these clouds, to your organization (single tenant) or any organizations (multitenant applications).
5152

5253
## Next steps
5354

54-
- Learn more about [Tenancy in Azure Active Directory](./single-and-multi-tenant-apps.md)
55-
- Learn more about [National Clouds](./authentication-national-cloud.md)
55+
- Learn more about [tenancy in Azure Active Directory](./single-and-multi-tenant-apps.md).
56+
- Learn more about [national clouds](./authentication-national-cloud.md).

0 commit comments

Comments
 (0)