Skip to content

Commit

Permalink
Merge branch 'dev' into remove-rt-on-bad-token
Browse files Browse the repository at this point in the history
  • Loading branch information
hectormmg authored Dec 11, 2023
2 parents c028a0c + 21afd75 commit e4a19ce
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion lib/msal-browser/FAQ.md
Original file line number Diff line number Diff line change
Expand Up @@ -255,7 +255,7 @@ If the developer provides `azureCloudOptions`, MSAL.js will overwrite any value

## What should I set my `redirectUri` to?

When you attempt to authenticate MSAL will navigate to your IDP's sign in page either in the current window, a popup window or a hidden iframe depending on whether you used a redirect, popup or silent API respectively. When authentication is complete the IDP will redirect the window to the `redirectUri` specified in the request with the authentication response in the url hash. You can use any page in your application as your `redirectUri` but there are some additional considerations you should be aware of depending on which API you are using. All pages used as a `redirectUri` **must** be registered as a Reply Url of type "SPA" on your app registration.
When you attempt to authenticate MSAL will navigate to your IDP's sign in page either in the current window, a popup window or a hidden iframe depending on whether you used a redirect, popup or silent API respectively. When authentication is complete the IDP will redirect the window to the `redirectUri` specified in the request with the authentication response in the url hash. You can use any page in your application as your `redirectUri` but there are some additional considerations you should be aware of depending on which API you are using. All pages used as a `redirectUri` **must** be registered as a Reply Url of type "SPA" on your app registration. Additionally, the `redirectUri` must be of the same domain as the application requesting the token.

### RedirectUri for popup and silent flows

Expand Down

1 comment on commit e4a19ce

@github-actions
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Performance Alert ⚠️

Possible performance regression was detected for benchmark 'msal-node client-credential Regression Test'.
Benchmark result of this commit is worse than the previous benchmark result exceeding threshold 1.10.

Benchmark suite Current: e4a19ce Previous: 7483391 Ratio
ConfidentialClientApplication#acquireTokenByClientCredential-fromCache-resourceIsFirstItemInTheCache 187080 ops/sec (±1.94%) 220896 ops/sec (±1.14%) 1.18

This comment was automatically generated by workflow using github-action-benchmark.

CC: @bgavrilMS @Robbie-Microsoft

Please sign in to comment.