Skip to content

Commit be7971f

Browse files
Minor updates
1 parent 2bab918 commit be7971f

File tree

3 files changed

+11
-11
lines changed

3 files changed

+11
-11
lines changed

msal-python-conceptual/advanced/aad-b2c.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
atitle: Use MSAL Python to work with Azure AD B2C
2+
title: Use MSAL Python to work with Azure AD B2C
33
description: "You can use MSAL Python to sign-in users with social identities, acquire tokens, and customize the sign-in experience by using Azure AD B2C."
44
author: Dickson-Mwendia
55
manager: CelesteDG
@@ -70,13 +70,13 @@ doubles as a B2C web app sample. Its major file `app.py` works on both non-B2C a
7070
app.acquire_token_by_xyz(...) # Same as in non-B2C scenarios
7171
```
7272

73-
> There is no need to filter accounts by user flow,
74-
> as long as you are following a pattern of
75-
> "create different MSAL app for different user flow"
76-
> (because the B2C user flow is designed to behave like an isolated authority).
77-
> In practice, you will still typically reuse same MSAL app and its token cache for the SignIn user flow,
78-
> and only create new one-time MSAL app when invoking EditProfile or ResetPassword user flows,
79-
> whose returned token (if any) would not be useful anyway.
73+
There is no need to filter accounts by user flow,
74+
as long as you are following a pattern of
75+
"create different MSAL app for different user flow"
76+
(because the B2C user flow is designed to behave like an isolated authority).
77+
In practice, you will still typically reuse same MSAL app and its token cache for the SignIn user flow,
78+
and only create new one-time MSAL app when invoking EditProfile or ResetPassword user flows,
79+
whose returned token (if any) would not be useful anyway.
8080

8181
## Example of EditProfile and ResetPassword user flows
8282

@@ -101,7 +101,7 @@ You would just need to update your HTML template to include new link to, for exa
101101

102102
## Resource Owner Password Credentials (ROPC) With B2C
103103
>[!WARNING]
104-
> This flow has been deprecated for public client scenarios due to security risks, use a more secure flow. Follow [this guide](https://aka.ms/msal-ropc-migration) for migration guidance.
104+
>The Resource Owner Password Credential (ROPC) flow has been deprecated for public client applications due to security risks. Microsoft recommends using a more secure authentication flow. Follow the official guidance on how to [Migrate from ROPC](https://aka.ms/msal-ropc-migration).
105105
106106
There exists no API difference between a B2C and non-B2C scenario. The following content serves as a mini-tutorial.
107107

msal-python-conceptual/advanced/msal-python-adfs-support.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ The supported AD FS versions in this federated scenario are:
4040

4141
### Acquire a token via username and password
4242
>[!WARNING]
43-
> This method of token acquisition has been deprecated for public client flows due to security risks, use a more secure flow. Follow [this guide](https://aka.ms/msal-ropc-migration) for migration guidance.
43+
>The Resource Owner Password Credential (ROPC) flow has been deprecated for public client applications due to security risks. Microsoft recommends using a more secure authentication flow. Follow the official guidance on how to [Migrate from ROPC](https://aka.ms/msal-ropc-migration).
4444
4545
The following applies whether you connect directly to Active Directory Federation Services (AD FS) or through Active Directory.
4646

msal-python-conceptual/advanced/username-password-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.custom: sfi-image-nochange
1616
# Username and password authentication
1717

1818
>[!WARNING]
19-
> This flow has been deprecated for public client scenarios due to security risks, use a more secure flow. Follow [this guide](https://aka.ms/msal-ropc-migration) for migration guidance.
19+
>The Resource Owner Password Credential (ROPC) flow has been deprecated for public client applications due to security risks. Microsoft recommends using a more secure authentication flow. Follow the official guidance on how to [Migrate from ROPC](https://aka.ms/msal-ropc-migration).
2020
2121
The content below are applicable to [all MSAL libraries](/entra/msal), not just MSAL Python.
2222

0 commit comments

Comments
 (0)