Skip to content

Commit 058dfc5

Browse files
authored
update
1 parent baf0dd3 commit 058dfc5

1 file changed

Lines changed: 4 additions & 2 deletions

File tree

support/entra/entra-id/app-integration/confidential-client-application-authentication-error-aadsts7000218.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,13 +55,15 @@ In the Microsoft Entra App Registration model, a registered application can be b
5555

5656
## How Microsoft Entra ID determines the client type
5757

58-
- Based on the type of the redirect URI (reply URL):
58+
To determines the client type, use one of the following methods:
59+
60+
- Use the type of the redirect URI (reply URL):
5961

6062
Microsoft Entra ID checks the redirect URI (reply URL) provided in the request and cross-checks it with the redirect URI registered in the App Registrations.
6163
- A **Web** type redirect URI classifies the application as a confidential client.
6264
- A **Public client (mobile & desktop)** type redirect URI classifies the application as a **public client**.
6365

64-
- Based on default client type (when no reply URL is provided):
66+
- Use the default client type (when no reply URL is provided):
6567

6668
In some OAuth 2.0 flows, such as the [OAuth 2 Resource Owner Password Credentials (ROPC)](/azure/active-directory/develop/v2-oauth-ropc) grant flow, [OAuth 2 device authorization grant flow](/entra/identity-platform/v2-oauth2-device-code) and Integrated Windows Authentication, there is no reply URL provided in the token request. In these cases, Microsoft Entra ID uses the app registration's default client type to determine whether the client is confidential or public.
6769

0 commit comments

Comments
 (0)