You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/v2-oauth2-client-creds-grant-flow.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -141,11 +141,11 @@ After you've received a successful response from the app provisioning endpoint,
141
141
142
142
After you've acquired the necessary authorization for your application, proceed with acquiring access tokens for APIs. To get a token by using the client credentials grant, send a POST request to the `/token` Microsoft identity platform. There are a few different cases:
143
143
144
-
-[Access token request with a shared secret](#access_token_request_with_shared_secret)
145
-
-[Access token request with a certificate](#access_token_request_with_a_certificate)
146
-
-[Access token request with a federated credential](#access_token_request_with_a_federated credential)
144
+
-[Access token request with a shared secret](#first-case-access-token-request-with-shared_secret)
145
+
-[Access token request with a certificate](#second-case-access-token-request-with-a-certificate)
146
+
-[Access token request with a federated credential](#third-case-access-token-request-with-a-federated-credential)
147
147
148
-
### Access token request with a shared secret
148
+
### First case: Access token request with a shared secret
149
149
150
150
```HTTP
151
151
POST /{tenant}/oauth2/v2.0/token HTTP/1.1 //Line breaks for clarity
|`client_secret`| Required | The client secret that you generated for your app in the app registration portal. The client secret must be URL-encoded before being sent. The Basic auth pattern of instead providing credentials in the Authorization header, per [RFC 6749](https://datatracker.ietf.org/doc/html/rfc6749#section-2.3.1) is also supported. |
172
172
|`grant_type`| Required | Must be set to `client_credentials`. |
173
173
174
-
### Access token request with a certificate
174
+
### Second case: Access token request with a certificate
175
175
176
176
```HTTP
177
177
POST /{tenant}/oauth2/v2.0/token HTTP/1.1 // Line breaks for clarity
The parameters for the certificate-based request differ in only one way from the shared secret-based request: the `client_secret` parameter is replaced by the `client_assertion_type` and `client_assertion` parameters.
198
198
199
-
### Access token request with a federated credential
199
+
### Third case: Access token request with a federated credential
200
200
201
201
```HTTP
202
202
POST /{tenant}/oauth2/v2.0/token HTTP/1.1 // Line breaks for clarity
0 commit comments