You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/entra/entra-id/app-integration/confidential-client-application-authentication-error-aadsts7000218.md
+5-7Lines changed: 5 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,19 +30,17 @@ This issue occurs because the application doesn't provide its credential (a clie
30
30
31
31
## Resolution
32
32
33
-
To resolve this issue, include the client secret or client assertion in the token request. If you're not sure if the application is a credential client, go to the Verify if the application is a credential client section.
33
+
To resolve this issue, include the client secret or client assertion in the token request.
34
34
35
-
In some authentication flow scenarios such as [OAuth 2 Resource Owner Password Credentials (ROPC)](/entra/identity-platform/v2-oauth-ropc) grant flow or [OAuth 2 device authorization grant flow](/entra/identity-platform/v2-oauth2-device-code) where you don't expect the client application to be confidential, change the default client type to public in the App Registration:
35
+
In some authentication flow scenarios such as [OAuth 2 Resource Owner Password Credentials (ROPC)](/entra/identity-platform/v2-oauth-ropc) grant flow or [OAuth 2 device authorization grant flow](/entra/identity-platform/v2-oauth2-device-code) where you don't expect the client application to be confidential, change the default client type to public in the **App registrations**:
36
36
37
37
1. In the [Azure portal](https://portal.azure.com/), in **App registrations**, select your application, and then select **Authentication**.
3. For **Treat application as a public client**, select **Yes**.
40
40
41
41
Changing the default client type from confidential to public causes security implications. For more information, see [What’s the security implication of changing the default client type from confidential to public in Azure AD?](https://blogs.aaddevsup.xyz/2020/09/whats-the-security-implication-of-changing-the-default-client-type-from-confidential-to-public-in-azure-ad/)
42
42
43
-
## Verify if the application is a credential client
44
-
45
-
### Understand client types in Microsoft Entra ID
43
+
## Understand client types in Microsoft Entra ID
46
44
47
45
As defined in the [OAuth 2.0 specifications](https://tools.ietf.org/html/rfc6749), client applications are categorized into two types:
48
46
@@ -55,7 +53,7 @@ As defined in the [OAuth 2.0 specifications](https://tools.ietf.org/html/rfc6749
55
53
56
54
In the Microsoft Entra App Registration model, a registered application can be both a public client and a confidential client, depending on the context the application is used in. This is because an application might have part of it used as a public client while some other parts are designed to be used as a confidential client. Depending on workflows, the application developer must decide if the application should act as a public or confidential client. A confidential client is expected in certain OAuth2 grant flows such as Client Credentials flow, Authorization Code flow, or On-Behalf-Of flow. It uses a flow to request a token.
57
55
58
-
###How Microsoft Entra ID determines the client type
56
+
## How Microsoft Entra ID determines the client type
59
57
60
58
- Based on the type of the redirect URI (reply URL):
61
59
@@ -70,7 +68,7 @@ In the Microsoft Entra App Registration model, a registered application can be b
70
68
- If **Default client type** is set to **Yes**, the client is public.
71
69
- If it's set to **No**, the client is confidential.
72
70
73
-
####How to identify the grant type and redirect URI used by an application
71
+
### How to identify the grant type and redirect URI used by an application
74
72
75
73
Review the application code or capture a [Fiddler](https://blogs.aaddevsup.xyz/2018/09/capture-https-traffic-with-http-fiddler/) trace to inspect the grant_type and redirect_uri parameters sent in the POST request to Microsoft Entra ID's token endpoint:
0 commit comments