
- The name of your Azure AD B2C tenant.In the following example, you replace these values in the query string: Below is an example of a request to the /authorize endpoint for an authorization code. To request an access token, you need an authorization code. If the response_type parameter in an /authorize request includes token, the scope parameter must include at least one resource scope other than openid and offline_access that will be granted. 00000000-0000-0000-0000-000000000000 - Using the client ID as the scope indicates that your app needs an access token that can be used against your own service or web API, represented by the same client ID.offline_access - Requests a refresh token using Auth Code flows.The following scopes represent the permission to access the user's profile: The OpenID Connect standard specifies several special scope values. The scp claim in the resulting access token is populated with only the permissions that were successfully granted. If you request more scopes than what is granted for your client application, the call succeeds if at least one permission is granted. The following example shows scopes encoded in a URL: scope=https%3A%2F%%2Fapi%2Fread%20openid%20offline_access The following example shows scopes decoded in a URL: scope= openid offline_access To acquire multiple permissions in the same request, you can add multiple entries in the single scope parameter of the request, separated by spaces. For example, users of the web API could have both read and write access, or users of the web API might have only read access. Scopes are used by the web API to implement scope-based access control. For example, to specify the Scope Value of read for the API that has the App ID URI of, the scope would be. When an access token is requested, the client application needs to specify the desired permissions in the scope parameter of the request. Scopes provide a way to manage permissions to protected resources. If you haven't already done so, add a web API application to your Azure Active Directory B2C tenant.Create a user flow to enable users to sign up and sign in to your application.Although On-Behalf-Of works for applications registered in Azure AD, it does not work for applications registered in Azure AD B2C, regardless of the tenant (Azure AD or Azure AD B2C) that is issuing the tokens. However, the On-Behalf-Of flow is not currently implemented in Azure AD B2C. This chained web API scenario can be supported by using the OAuth 2.0 JWT Bearer Credential grant, otherwise known as the On-Behalf-Of flow. This scenario is common in clients that have a web API back end, which in turn calls a another service. Many architectures include a web API that needs to call another downstream web API, both secured by Azure AD B2C. Web API chains (On-Behalf-Of) is not supported by Azure AD B2C.
