You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/v2-protocols-oidc.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.date: 08/26/2022
9
9
ms.reviewer: ludwignick
10
10
ms.service: active-directory
11
11
ms.subservice: develop
12
-
ms.topic: reference
12
+
ms.topic: conceptual
13
13
---
14
14
15
15
# OpenID Connect on the Microsoft identity platform
@@ -83,7 +83,7 @@ Host: login.microsoftonline.com
83
83
```
84
84
85
85
> [!TIP]
86
-
> Try it! To see the OpenID configuration document for an application's `common` authority, navigate to[https://login.microsoftonline.com/common/v2.0/.well-known/openid-configuration](https://login.microsoftonline.com/common/v2.0/.well-known/openid-configuration).
86
+
> Try it! To see the OpenID configuration document for an application's `common` authority, navigate to[https://login.microsoftonline.com/common/v2.0/.well-known/openid-configuration](https://login.microsoftonline.com/common/v2.0/.well-known/openid-configuration).
87
87
88
88
### Sample response
89
89
@@ -111,7 +111,7 @@ The configuration metadata is returned in JSON format as shown in the following
111
111
112
112
## Send the sign-in request
113
113
114
-
To authenticate a user and request an ID token for use in your application, direct the user's user-agent to the Microsoft identity platform's _/authorize_ endpoint. The request is similar to the first leg of the [OAuth 2.0 authorization code flow](v2-oauth2-auth-code-flow.md) but with these distinctions:
114
+
To authenticate a user and request an ID token for use in your application, direct their user-agent to the Microsoft identity platform's _/authorize_ endpoint. The request is similar to the first leg of the [OAuth 2.0 authorization code flow](v2-oauth2-auth-code-flow.md) but with these distinctions:
115
115
116
116
* Include the `openid` scope in the `scope` parameter.
117
117
* Specify `id_token` or `code+id_token` in the `response_type` parameter.
@@ -202,7 +202,7 @@ Receiving an ID token in your app might not always be sufficient to fully authen
202
202
203
203
Web apps and web APIs that use ID tokens for authorization must validate them because such applications gate access to data. Other types of application might not benefit from ID token validation, however. Native and single-page apps (SPAs), for example, rarely benefit from ID token validation because any entity with physical access to the device or browser can potentially bypass the validation. Methods of token validation bypass include providing fake tokens or keys by modifying network traffic to the device and by debugging the application and stepping over the validation logic during program execution.
204
204
205
-
If you need or choose to validate ID tokens in your application, we recommend not doing so manually, and instead using a library to parse and validate the tokens. Token validation libraries are available for most development languages, frameworks, and platforms.
205
+
If you need or choose to validate ID tokens in your application, we recommend not doing so manually. Instead, use a token validation library to parse and validate the tokens. Token validation libraries are available for most development languages, frameworks, and platforms.
206
206
207
207
### What to validate in an ID token
208
208
@@ -238,7 +238,7 @@ client_id=6731de76-14a6-49ae-97bc-6eba6914391e // Your app registration's
238
238
&response_type=id_token%20token // Requests both an ID token and access token
239
239
&redirect_uri=http%3A%2F%2Flocalhost%2Fmyapp%2F // Your application's redirect URI (URL-encoded)
240
240
&response_mode=form_post // 'form_post' or 'fragment'
241
-
&scope=openid+profile+email // 'openid' is required; 'profile' and 'email' provide additional information in the UserInfo endpoint the same way they do in an ID token.
241
+
&scope=openid+profile+email // 'openid' is required; 'profile' and 'email' provide information in the UserInfo endpoint as they do in an ID token.
0 commit comments