Skip to content

Commit 6362806

Browse files
committed
Document why recommend against using Implicit Grant, to avoid future #249
1 parent e3d5041 commit 6362806

File tree

1 file changed

+6
-2
lines changed

1 file changed

+6
-2
lines changed

msal/application.py

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -285,7 +285,7 @@ def get_authorization_request_url(
285285
login_hint=None, # type: Optional[str]
286286
state=None, # Recommended by OAuth2 for CSRF protection
287287
redirect_uri=None,
288-
response_type="code", # Can be "token" if you use Implicit Grant
288+
response_type="code", # Could be "token" if you use Implicit Grant
289289
prompt=None,
290290
nonce=None,
291291
domain_hint=None, # type: Optional[str]
@@ -302,7 +302,11 @@ def get_authorization_request_url(
302302
Address to return to upon receiving a response from the authority.
303303
:param str response_type:
304304
Default value is "code" for an OAuth2 Authorization Code grant.
305-
You can use other content such as "id_token".
305+
306+
You could use other content such as "id_token" or "token",
307+
which would trigger an Implicit Grant, but that is
308+
`not recommended <https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-implicit-grant-flow#is-the-implicit-grant-suitable-for-my-app>`_.
309+
306310
:param str prompt:
307311
By default, no prompt value will be sent, not even "none".
308312
You will have to specify a value explicitly.

0 commit comments

Comments
 (0)