Skip to content

Commit f3fca18

Browse files
authored
Fixing and reverting to old headers which broke 7 articles
1 parent ca7333f commit f3fca18

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/active-directory/develop/v2-oauth2-client-creds-grant-flow.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -141,11 +141,11 @@ After you've received a successful response from the app provisioning endpoint,
141141

142142
After you've acquired the necessary authorization for your application, proceed with acquiring access tokens for APIs. To get a token by using the client credentials grant, send a POST request to the `/token` Microsoft identity platform. There are a few different cases:
143143

144-
- [Access token request with a shared secret](#access_token_request_with_shared_secret)
145-
- [Access token request with a certificate](#access_token_request_with_a_certificate)
146-
- [Access token request with a federated credential](#access_token_request_with_a_federated credential)
144+
- [Access token request with a shared secret](#first-case-access-token-request-with-shared_secret)
145+
- [Access token request with a certificate](#second-case-access-token-request-with-a-certificate)
146+
- [Access token request with a federated credential](#third-case-access-token-request-with-a-federated-credential)
147147

148-
### Access token request with a shared secret
148+
### First case: Access token request with a shared secret
149149

150150
```HTTP
151151
POST /{tenant}/oauth2/v2.0/token HTTP/1.1 //Line breaks for clarity
@@ -171,7 +171,7 @@ curl -X POST -H "Content-Type: application/x-www-form-urlencoded" -d 'client_id=
171171
| `client_secret` | Required | The client secret that you generated for your app in the app registration portal. The client secret must be URL-encoded before being sent. The Basic auth pattern of instead providing credentials in the Authorization header, per [RFC 6749](https://datatracker.ietf.org/doc/html/rfc6749#section-2.3.1) is also supported. |
172172
| `grant_type` | Required | Must be set to `client_credentials`. |
173173

174-
### Access token request with a certificate
174+
### Second case: Access token request with a certificate
175175

176176
```HTTP
177177
POST /{tenant}/oauth2/v2.0/token HTTP/1.1 // Line breaks for clarity
@@ -196,7 +196,7 @@ scope=https%3A%2F%2Fgraph.microsoft.com%2F.default
196196

197197
The parameters for the certificate-based request differ in only one way from the shared secret-based request: the `client_secret` parameter is replaced by the `client_assertion_type` and `client_assertion` parameters.
198198

199-
### Access token request with a federated credential
199+
### Third case: Access token request with a federated credential
200200

201201
```HTTP
202202
POST /{tenant}/oauth2/v2.0/token HTTP/1.1 // Line breaks for clarity

0 commit comments

Comments
 (0)