Skip to content

Commit b315f43

Browse files
authored
Update authentication-scenarios.md
Previously in the v1 docs, we had the section "How each flow emits tokens and codes". The table in it helps our customer to rapidly see with each flow what they can expect. I strongly believe that this can help to a better and clearer understanding. The links on the table where updated to the correct v2 flow links.
1 parent 23ea068 commit b315f43

File tree

1 file changed

+17
-0
lines changed

1 file changed

+17
-0
lines changed

articles/active-directory/develop/authentication-scenarios.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -74,6 +74,23 @@ Tokens are only valid for a limited amount of time. Usually the STS provides a p
7474

7575
Access tokens are passed to a Web API as the bearer token in the `Authorization` header. An app can provide a refresh token to the STS, and if the user access to the app wasn't revoked, it will get back a new access token and a new refresh token. This is how the scenario of someone leaving the enterprise is handled. When the STS receives the refresh token, it won't issue another valid access token if the user is no longer authorized.
7676

77+
### How each flow emits tokens and codes
78+
79+
Depending on how your client is built, it can use one (or several) of the authentication flows supported by Azure AD. These flows can produce a variety of tokens (id_tokens, refresh tokens, access tokens) as well as authorization codes, and require different tokens to make them work. This chart provides an overview:
80+
81+
|Flow | Requires | id_token | access token | refresh token | authorization code |
82+
|-----|----------|----------|--------------|---------------|--------------------|
83+
|[Authorization code flow](v2-oauth2-auth-code-flow.md) | | x | x | x | x|
84+
|[Implicit flow](v2-oauth2-implicit-grant-flow.md) | | x | x | | |
85+
|[Hybrid OIDC flow](v2-protocols-oidc.md#get-access-tokens)| | x | | | x |
86+
|[Refresh token redemption](v2-oauth2-auth-code-flow.md#refreshing-the-access-tokens) | refresh token | x | x | x| |
87+
|[On-behalf-of flow](v2-oauth2-on-behalf-of-flow.md) | access token| x| x| x| |
88+
|[Client credentials](v2-oauth2-client-creds-grant-flow.md) | | | x (app-only)| | |
89+
90+
Tokens issued via the implicit mode have a length limitation due to being passed back to the browser via the URL (where `response_mode` is `query` or `fragment`). Some browsers have a limit on the size of the URL that can be put in the browser bar and fail when it is too long. Thus, these tokens do not have `groups` or `wids` claims.
91+
92+
Now that you have an overview of the basics, read on to understand the identity app model and API, how provisioning works in Azure AD, and links to detailed info about the common scenarios that Azure AD supports.
93+
7794
## Application model
7895

7996
Applications can sign in users themselves or delegate sign-in to an identity provider. See [Authentication flows and app scenarios](authentication-flows-app-scenarios.md) to learn about sign-in scenarios supported by Azure AD.

0 commit comments

Comments
 (0)