diff --git a/power-platform/admin/programmability-authentication.md b/power-platform/admin/programmability-authentication.md index 93b6d686e1..638da92b4e 100644 --- a/power-platform/admin/programmability-authentication.md +++ b/power-platform/admin/programmability-authentication.md @@ -20,7 +20,7 @@ This article provides an overview of the authentication setup for the various pr For an overview of general Microsoft Entra client application creation, visit [Quickstart: Register an application with the Microsoft identity platform](/azure/active-directory/develop/quickstart-register-app). However, for Microsoft Power Platform, there are some specifics worth mentioning in the sections below. ### Authentication advanced settings -In the Azure portal, navigate to your newly created client application and select the **Manage - Authentication** tab. Under the **Advanced Settings** section, set the **Public Client** switch to **Yes**. This will ensure you can obtain a JSON Web Token (JWT) using simple username and password authentication. This type of authentication is required for interactive applications you might build and for registering a Service Principal entry in Microsoft Power Platform. +In the Azure portal, navigate to your newly created client application and select the **Manage - Authentication** tab. Under the **Advanced Settings** section, set the **Allow public client flows** switch to **Yes**. This will ensure you can obtain a JSON Web Token (JWT) using simple username and password authentication. This type of authentication is required for interactive applications you might build and for registering a Service Principal entry in Microsoft Power Platform. ### API permissions In the Azure portal, navigate to the **Manage - API Permissions** tab. Under the **Configure permissions** section, select **Add a Permission**. On the dialog window that opens, select the **APIs my organization uses** tab, and then search for **Power Apps Service** (or **PowerApps service**). You might see several entries with a name similar to this, so ensure you use the one with the GUID **475226c6-020e-4fb2-8a90-7a972cbfc1d4**. Include all of the Delegated Permissions such as the **User permissions - Access the Power Apps Service API** option. @@ -86,4 +86,4 @@ Use the **access_token** value in subsequent calls to the Power Platform API usi ### See also -[Preview: Creating a service principal application via API](powerplatform-api-create-service-principal.md) \ No newline at end of file +[Preview: Creating a service principal application via API](powerplatform-api-create-service-principal.md)