Skip to content

Commit ed5ebe6

Browse files
committed
removed redirect info
1 parent cecdcbc commit ed5ebe6

1 file changed

Lines changed: 0 additions & 11 deletions

File tree

msal-dotnet-articles/acquiring-tokens/desktop-mobile/linux-dotnet-sdk.md

Lines changed: 0 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -263,17 +263,6 @@ This video demonstrates the sign-in experience on brokered flows on Linux
263263

264264
![Demo of the Linux Login component component](../../media/linux/linux-entra-login.gif)
265265

266-
## Redirect URI
267-
268-
Redirect URIs don't need to be configured in MSAL, but they must be configured in the app registration. They should follow the pattern below:
269-
270-
```text
271-
ms-appx-web://microsoft.aad.brokerplugin/{client_id}
272-
```
273-
274-
>[!NOTE]
275-
>When configuring the redirect URL in the Azure portal, ensure that you're setting it in the **Mobile and desktop applications** section.
276-
277266
## Username/password flow
278267

279268
This flow, also known as Resource Owner Password Credentials (ROPC), isn't recommended except in test scenarios or in scenarios where service principal access to a resource gives it too much access and you can only scope it down with user flows. When using the broker, [`AcquireTokenByUsernamePassword`](xref:Microsoft.Identity.Client.PublicClientApplication.AcquireTokenByUsernamePassword*) lets the broker manage the protocol and fetch tokens.

0 commit comments

Comments
 (0)