Results 2.0

Geno 2.0 results
  1. Real Results 2.0 Reviews
  2. My Geno 2.0 Results
  3. Results 2020
  4. Results 2.0
-->

The OAuth 2.0 authorization code grant can be used in apps that are installed on a device to gain access to protected resources, such as web APIs. Using the Microsoft identity platform implementation of OAuth 2.0, you can add sign in and API access to your mobile and desktop apps.

This article describes how to program directly against the protocol in your application using any language. When possible, we recommend you use the supported Microsoft Authentication Libraries (MSAL) instead to acquire tokens and call secured web APIs. Also take a look at the sample apps that use MSAL.

Results

The OAuth 2.0 authorization code flow is described in section 4.1 of the OAuth 2.0 specification. It's used to perform authentication and authorization in the majority of app types, including single page apps, web apps, and natively installed apps. The flow enables apps to securely acquire access_tokens that can be used to access resources secured by the Microsoft identity platform, as well as refresh tokens to get additional access_tokens, and ID tokens for the signed in user.

Protocol diagram

At a high level, the entire authentication flow for an application looks a bit like this:

Although importing Geno 2.0 results doesn't delete the results from the SNP testing that was previously performed at FTDNA, it will override what appears on the project pages. Apparently, there is a delay for some accounts receiving the raw data download option and so far, mine hasn't appeared yet. Test Results Manager 2.0 (TRM® 2.0) is Windows®-compatible PC software providing an all-in-one analysis, viewer and reporting tool designed for use with AFL fiber optic test and inspection products. TRM 2.0 is available in Basic and Advanced versions. What is the mass of water that results from combining 2.0 g of hydrogen with 16.0 g of oxygen? 14.0 g (I'm thinking this.) 16.0 g 18.0 g 20.0 g. 1) Survey results are now available in Excel spreadsheet format. 2) Click on the Survey Results tab to open the spreadsheet and view your survey results. 3) The spreadsheet opens in read-only format. Choose Edit Workbook to work within the spreadsheet.

Redirect URI setup required for single-page apps

The authorization code flow for single page applications requires some additional setup. Follow the instructions for creating your single-page application to correctly mark your redirect URI as enabled for CORS. To update an existing redirect URI to enable CORS, open the manifest editor and set the type field for your redirect URI to spa in the replyUrlsWithType section. You can also click on the redirect URI in the 'Web' section of the Authentication tab, and select the URIs you want to migrate to using the authorization code flow.

The spa redirect type is backwards compatible with the implicit flow. Apps currently using the implicit flow to get tokens can move to the spa redirect URI type without issues and continue using the implicit flow.

If you attempt to use the authorization code flow and see this error:

access to XMLHttpRequest at 'https://login.microsoftonline.com/common/v2.0/oauth2/token' from origin 'yourApp.com' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource.

Then you need to visit your app registration and update the redirect URI for your app to type spa.

Request an authorization code

The authorization code flow begins with the client directing the user to the /authorize endpoint. In this request, the client requests the openid, offline_access, and https://graph.microsoft.com/mail.read permissions from the user. Some permissions are admin-restricted, for example writing data to an organization's directory by using Directory.ReadWrite.All. If your application requests access to one of these permissions from an organizational user, the user receives an error message that says they're not authorized to consent to your app's permissions. To request access to admin-restricted scopes, you should request them directly from a Global Administrator. For more information, read Admin-restricted permissions.

Results 2.0

Tip

Click the link below to execute this request! After signing in, your browser should be redirected to https://localhost/myapp/ with a code in the address bar.https://login.microsoftonline.com/common/oauth2/v2.0/authorize...

ParameterRequired/optionalDescription
tenantrequiredThe {tenant} value in the path of the request can be used to control who can sign into the application. The allowed values are common, organizations, consumers, and tenant identifiers. For more detail, see protocol basics.
client_idrequiredThe Application (client) ID that the Azure portal – App registrations experience assigned to your app.
response_typerequiredMust include code for the authorization code flow. Can also include id_token or token if using the hybrid flow.
redirect_urirequiredThe redirect_uri of your app, where authentication responses can be sent and received by your app. It must exactly match one of the redirect_uris you registered in the portal, except it must be url encoded. For native & mobile apps, you should use the default value of https://login.microsoftonline.com/common/oauth2/nativeclient.
scoperequiredA space-separated list of scopes that you want the user to consent to. For the /authorize leg of the request, this can cover multiple resources, allowing your app to get consent for multiple web APIs you want to call.
response_moderecommendedSpecifies the method that should be used to send the resulting token back to your app. Can be one of the following:
- query
- fragment
- form_post
query provides the code as a query string parameter on your redirect URI. If you're requesting an ID token using the implicit flow, you can't use query as specified in the OpenID spec. If you're requesting just the code, you can use query, fragment, or form_post. form_post executes a POST containing the code to your redirect URI.
staterecommendedA value included in the request that will also be returned in the token response. It can be a string of any content that you wish. A randomly generated unique value is typically used for preventing cross-site request forgery attacks. The value can also encode information about the user's state in the app before the authentication request occurred, such as the page or view they were on.
promptoptionalIndicates the type of user interaction that is required. The only valid values at this time are login, none, and consent.
- prompt=login will force the user to enter their credentials on that request, negating single-sign on.
- prompt=none is the opposite - it will ensure that the user isn't presented with any interactive prompt whatsoever. If the request can't be completed silently via single-sign on, the Microsoft identity platform will return an interaction_required error.
- prompt=consent will trigger the OAuth consent dialog after the user signs in, asking the user to grant permissions to the app.
- prompt=select_account will interrupt single sign-on providing account selection experience listing all the accounts either in session or any remembered account or an option to choose to use a different account altogether.
login_hintoptionalCan be used to pre-fill the username/email address field of the sign-in page for the user, if you know their username ahead of time. Often apps will use this parameter during re-authentication, having already extracted the username from a previous sign-in using the preferred_username claim.
domain_hintoptionalIf included, it will skip the email-based discovery process that user goes through on the sign-in page, leading to a slightly more streamlined user experience - for example, sending them to their federated identity provider. Often apps will use this parameter during re-authentication, by extracting the tid from a previous sign-in. If the tid claim value is 9188040d-6c67-4c5b-b112-36a304b66dad, you should use domain_hint=consumers. Otherwise, use domain_hint=organizations.
code_challengerecommended / requiredUsed to secure authorization code grants via Proof Key for Code Exchange (PKCE). Required if code_challenge_method is included. For more information, see the PKCE RFC. This is now recommended for all application types - native apps, SPAs, and confidential clients like web apps.
code_challenge_methodrecommended / requiredThe method used to encode the code_verifier for the code_challenge parameter. This SHOULD be S256, but the spec allows the use of plain if for some reason the client cannot support SHA256.
If excluded, code_challenge is assumed to be plaintext if code_challenge is included. The Microsoft identity platform supports both plain and S256. For more information, see the PKCE RFC. This is required for single page apps using the authorization code flow.

At this point, the user will be asked to enter their credentials and complete the authentication. The Microsoft identity platform will also ensure that the user has consented to the permissions indicated in the scope query parameter. If the user has not consented to any of those permissions, it will ask the user to consent to the required permissions. Details of permissions, consent, and multi-tenant apps are provided here.

Once the user authenticates and grants consent, the Microsoft identity platform will return a response to your app at the indicated redirect_uri, using the method specified in the response_mode parameter.

Successful response

A successful response using response_mode=query looks like:

ParameterDescription
codeThe authorization_code that the app requested. The app can use the authorization code to request an access token for the target resource. Authorization_codes are short lived, typically they expire after about 10 minutes.
stateIf a state parameter is included in the request, the same value should appear in the response. The app should verify that the state values in the request and response are identical.

You can also receive an ID token if you request one and have the implicit grant enabled in your application registration. This is sometimes referred to as the 'hybrid flow', and is used by frameworks like ASP.NET.

Error response

Error responses may also be sent to the redirect_uri so the app can handle them appropriately:

ParameterDescription
errorAn error code string that can be used to classify types of errors that occur, and can be used to react to errors.
error_descriptionA specific error message that can help a developer identify the root cause of an authentication error.

Error codes for authorization endpoint errors

The following table describes the various error codes that can be returned in the error parameter of the error response.

Error CodeDescriptionClient Action
invalid_requestProtocol error, such as a missing required parameter.Fix and resubmit the request. This is a development error typically caught during initial testing.
unauthorized_clientThe client application isn't permitted to request an authorization code.This error usually occurs when the client application isn't registered in Azure AD or isn't added to the user's Azure AD tenant. The application can prompt the user with instruction for installing the application and adding it to Azure AD.
access_deniedResource owner denied consentThe client application can notify the user that it can't proceed unless the user consents.
unsupported_response_typeThe authorization server does not support the response type in the request.Fix and resubmit the request. This is a development error typically caught during initial testing. When seen in the hybrid flow, signals that you must enable the ID token implicit grant setting on the client app registration.
server_errorThe server encountered an unexpected error.Retry the request. These errors can result from temporary conditions. The client application might explain to the user that its response is delayed to a temporary error.
temporarily_unavailableThe server is temporarily too busy to handle the request.Retry the request. The client application might explain to the user that its response is delayed because of a temporary condition.
invalid_resourceThe target resource is invalid because it does not exist, Azure AD can't find it, or it's not correctly configured.This error indicates the resource, if it exists, has not been configured in the tenant. The application can prompt the user with instruction for installing the application and adding it to Azure AD.
login_requiredToo many or no users foundThe client requested silent authentication (prompt=none), but a single user could not found. This may mean there are multiple users active in the session, or no users. This takes into account the tenant chosen (for example, if there are two Azure AD accounts active and one Microsoft account, and consumers is chosen, silent authentication will work).
interaction_requiredThe request requires user interaction.An additional authentication step or consent is required. Retry the request without prompt=none.

Request an ID token as well (hybrid flow)

To learn who the user is before redeeming an authorization code, it's common for applications to also request an ID token when they request the authorization code. This is called the hybrid flow because it mixes the implicit grant with the authorization code flow. The hybrid flow is commonly used in web apps that want to render a page for a user without blocking on code redemption, notably ASP.NET. Both single-page apps and traditional web apps benefit from reduced latency in this model.

The hybrid flow is the same as the authorization code flow described earlier but with three additions, all of which are required to request an ID token: new scopes, a new response_type, and a new nonce query parameter.

Updated ParameterRequired/optionalDescription
response_typeRequiredThe addition of id_token indicates to the server that the application would like an ID token in the response from the /authorize endpoint.
scopeRequiredFor ID tokens, must be updated to include the ID token scopes - openid, and optionally profile and email.
nonceRequiredA value included in the request, generated by the app, that will be included in the resulting id_token as a claim. The app can then verify this value to mitigate token replay attacks. The value is typically a randomized, unique string that can be used to identify the origin of the request.
response_modeRecommendedSpecifies the method that should be used to send the resulting token back to your app. Defaults to query for just an authorization code, but fragment if the request includes an id_token response_type.

The use of fragment as a response mode can cause issues for web apps that read the code from the redirect, as browsers do not pass the fragment to the web server. In these situations, apps are recommended to use the form_post response mode to ensure that all data is sent to the server.

Successful response

A successful response using response_mode=fragment looks like:

ParameterDescription
codeThe authorization code that the app requested. The app can use the authorization code to request an access token for the target resource. Authorization codes are short lived, typically expiring after about 10 minutes.
id_tokenAn ID token for the user, issued via implicit grant. Contains a special c_hash claim that is the hash of the code in the same request.
stateIf a state parameter is included in the request, the same value should appear in the response. The app should verify that the state values in the request and response are identical.

Request an access token

Now that you've acquired an authorization_code and have been granted permission by the user, you can redeem the code for an access_token to the desired resource. Do this by sending a POST request to the /token endpoint:

Tip

Try executing this request in Postman! (Don't forget to replace the code)

ParameterRequired/optionalDescription
tenantrequiredThe {tenant} value in the path of the request can be used to control who can sign into the application. The allowed values are common, organizations, consumers, and tenant identifiers. For more detail, see protocol basics.
client_idrequiredThe Application (client) ID that the Azure portal – App registrations page assigned to your app.
grant_typerequiredMust be authorization_code for the authorization code flow.
scopeoptionalA space-separated list of scopes. The scopes must all be from a single resource, along with OIDC scopes (profile, openid, email). For a more detailed explanation of scopes, refer to permissions, consent, and scopes. This is a Microsoft extension to the authorization code flow, intended to allow apps to declare the resource they want the token for during token redemption.
coderequiredThe authorization_code that you acquired in the first leg of the flow.
redirect_urirequiredThe same redirect_uri value that was used to acquire the authorization_code.
client_secretrequired for confidential web appsThe application secret that you created in the app registration portal for your app. You shouldn't use the application secret in a native app or single page app because client_secrets can't be reliably stored on devices or web pages. It's required for web apps and web APIs, which have the ability to store the client_secret securely on the server side. Like all parameters discussed here, the client secret must be URL-encoded before being sent, a step usually performed by the SDK. For more information on uri encoding, see the URI Generic Syntax specification.
code_verifierrecommendedThe same code_verifier that was used to obtain the authorization_code. Required if PKCE was used in the authorization code grant request. For more information, see the PKCE RFC.

Successful response

A successful token response will look like:

ParameterDescription
access_tokenThe requested access token. The app can use this token to authenticate to the secured resource, such as a web API.
token_typeIndicates the token type value. The only type that Azure AD supports is Bearer
expires_inHow long the access token is valid (in seconds).
scopeThe scopes that the access_token is valid for. Optional - this is non-standard, and if omitted the token will be for the scopes requested on the initial leg of the flow.
refresh_tokenAn OAuth 2.0 refresh token. The app can use this token acquire additional access tokens after the current access token expires. Refresh_tokens are long-lived, and can be used to retain access to resources for extended periods of time. For more detail on refreshing an access token, refer to the section below.
Note: Only provided if offline_access scope was requested.
id_tokenA JSON Web Token (JWT). The app can decode the segments of this token to request information about the user who signed in. The app can cache the values and display them, and confidential clients can use this for authorization. For more information about id_tokens, see the id_token reference.
Note: Only provided if openid scope was requested.

Error response

Error responses will look like:

ParameterDescription
errorAn error code string that can be used to classify types of errors that occur, and can be used to react to errors.
error_descriptionA specific error message that can help a developer identify the root cause of an authentication error.
error_codesA list of STS-specific error codes that can help in diagnostics.
timestampThe time at which the error occurred.
trace_idA unique identifier for the request that can help in diagnostics.
correlation_idA unique identifier for the request that can help in diagnostics across components.

Error codes for token endpoint errors

Error CodeDescriptionClient Action
invalid_requestProtocol error, such as a missing required parameter.Fix the request or app registration and resubmit the request
invalid_grantThe authorization code or PKCE code verifier is invalid or has expired.Try a new request to the /authorize endpoint and verify that the code_verifier parameter was correct.
unauthorized_clientThe authenticated client isn't authorized to use this authorization grant type.This usually occurs when the client application isn't registered in Azure AD or isn't added to the user's Azure AD tenant. The application can prompt the user with instruction for installing the application and adding it to Azure AD.
invalid_clientClient authentication failed.The client credentials aren't valid. To fix, the application administrator updates the credentials.
unsupported_grant_typeThe authorization server does not support the authorization grant type.Change the grant type in the request. This type of error should occur only during development and be detected during initial testing.
invalid_resourceThe target resource is invalid because it does not exist, Azure AD can't find it, or it's not correctly configured.This indicates the resource, if it exists, has not been configured in the tenant. The application can prompt the user with instruction for installing the application and adding it to Azure AD.
interaction_requiredNon-standard, as the OIDC specification calls for this only on the /authorize endpoint.The request requires user interaction. For example, an additional authentication step is required.Retry the /authorize request with the same scopes.
temporarily_unavailableThe server is temporarily too busy to handle the request.Retry the request after a small delay. The client application might explain to the user that its response is delayed because of a temporary condition.
consent_requiredThe request requires user consent. This error is non-standard, as it's usually only returned on the /authorize endpoint per OIDC specifications. Returned when a scope parameter was used on the code redemption flow that the client app does not have permission to request.The client should send the user back to the /authorize endpoint with the correct scope in order to trigger consent.
invalid_scopeThe scope requested by the app is invalid.Update the value of the scope parameter in the authentication request to a valid value.

Note

Single page apps may receive an invalid_request error indicating that cross-origin token redemption is permitted only for the 'Single-Page Application' client-type. This indicates that the redirect URI used to request the token has not been marked as a spa redirect URI. Review the application registration steps on how to enable this flow.

Use the access token

Now that you've successfully acquired an access_token, you can use the token in requests to web APIs by including it in the Authorization header:

Tip

Execute this request in Postman! (Replace the Authorization header first)

Refresh the access token

Access_tokens are short lived, and you must refresh them after they expire to continue accessing resources. You can do so by submitting another POST request to the /token endpoint, this time providing the refresh_token instead of the code. Refresh tokens are valid for all permissions that your client has already received consent for - thus, a refresh token issued on a request for scope=mail.read can be used to request a new access token for scope=api://contoso.com/api/UseResource.

Refresh tokens for web apps and native apps do not have specified lifetimes. Typically, the lifetimes of refresh tokens are relatively long. However, in some cases, refresh tokens expire, are revoked, or lack sufficient privileges for the desired action. Your application needs to expect and handle errors returned by the token issuance endpoint correctly. Single page apps, however, get a token with a 24 hour lifetime, requiring a new authentication every day. This can be done silently in an iframe when 3rd party cookies are enabled, but must be done in a top level frame (either full page navigation or a popup) in browsers without 3rd party cookies such as Safari.

Although refresh tokens aren't revoked when used to acquire new access tokens, you are expected to discard the old refresh token. The OAuth 2.0 spec says: 'The authorization server MAY issue a new refresh token, in which case the client MUST discard the old refresh token and replace it with the new refresh token. The authorization server MAY revoke the old refresh token after issuing a new refresh token to the client.'

Important

For refresh tokens sent to a redirect URI registered as spa, the refresh token will expire after 24 hours. Additional refresh tokens acquired using the initial refresh token will carry over that expiration time, so apps must be prepared to re-run the authorization code flow using an interactive authentication to get a new refresh token every 24 hours. Users do not have to enter their credentials, and will usually not even see any UX, just a reload of your application - but the browser must visit the login page in a top level frame in order to see the login session. This is due to privacy features in browsers that block 3rd party cookies.

Tip

Results 2 0 fitness in mcdonough

Try executing this request in Postman! (Don't forget to replace the refresh_token)

ParameterTypeDescription
tenantrequiredThe {tenant} value in the path of the request can be used to control who can sign into the application. The allowed values are common, organizations, consumers, and tenant identifiers. For more detail, see protocol basics.
client_idrequiredThe Application (client) ID that the Azure portal – App registrations experience assigned to your app.
grant_typerequiredMust be refresh_token for this leg of the authorization code flow.
scoperequiredA space-separated list of scopes. The scopes requested in this leg must be equivalent to or a subset of the scopes requested in the original authorization_code request leg. If the scopes specified in this request span multiple resource server, then the Microsoft identity platform will return a token for the resource specified in the first scope. For a more detailed explanation of scopes, refer to permissions, consent, and scopes.
refresh_tokenrequiredThe refresh_token that you acquired in the second leg of the flow.
client_secretrequired for web appsThe application secret that you created in the app registration portal for your app. It should not be used in a native app, because client_secrets can't be reliably stored on devices. It's required for web apps and web APIs, which have the ability to store the client_secret securely on the server side. This secret needs to be URL-Encoded. For more information, see the URI Generic Syntax specification.

Successful response

A successful token response will look like:

ParameterDescription
access_tokenThe requested access token. The app can use this token to authenticate to the secured resource, such as a web API.
token_typeIndicates the token type value. The only type that Azure AD supports is Bearer
expires_inHow long the access token is valid (in seconds).
scopeThe scopes that the access_token is valid for.
refresh_tokenA new OAuth 2.0 refresh token. You should replace the old refresh token with this newly acquired refresh token to ensure your refresh tokens remain valid for as long as possible.
Note: Only provided if offline_access scope was requested.
id_tokenAn unsigned JSON Web Token (JWT). The app can decode the segments of this token to request information about the user who signed in. The app can cache the values and display them, but it should not rely on them for any authorization or security boundaries. For more information about id_tokens, see the id_token reference.
Note: Only provided if openid scope was requested.

Real Results 2.0 Reviews

Error response

ParameterDescription
errorAn error code string that can be used to classify types of errors that occur, and can be used to react to errors.
error_descriptionA specific error message that can help a developer identify the root cause of an authentication error.
error_codesA list of STS-specific error codes that can help in diagnostics.
timestampThe time at which the error occurred.
trace_idA unique identifier for the request that can help in diagnostics.
correlation_idA unique identifier for the request that can help in diagnostics across components.

My Geno 2.0 Results

For a description of the error codes and the recommended client action, see Error codes for token endpoint errors.

To request missing sale reports email margo@liveauctions.tv

Results 2020

01/07/202119th Annual Denim & Diamonds Angus Sale
01/04/2021Limousin Foundation 'Genetics on Ice'
01/03/2021Limousin Foundation Sale
01/03/2021Registered for Success
01/02/2021Adams Angus Farm & Guest Bull Sale
12/12/2020Southeast Angus Classic Bull Sale

View Sale Results

11/27/2020The Elite - Donors and Divas
11/27/2020Ruby Cattle Compnay
11/27/2020

Innisfail Auction Market Bred Cow & Heifer Sale

View Sale Results
11/14/2020Deer Valley Farm - Focused on the Future
11/14/2020Bear Mountain Angus Production Sale
11/14/2020Altantic Elite Charolais Sale
11/13/2020Ingram Angus Production Sale
11/10/2020Coleman Embryo Auction
11/7/2020Harvie Ranch
11/7/2020Barnett Angus Ranch Sale
11/7/2020Worthington Angus Sale
11/7/2020Midwest Breeders Black Hereford Sale
11/7/2020Wheeler Farms & Guest Sale
11/7/2020Missouri Fall Harvest Sale
11/7/2020Carson Pride & Joy Simmental Sale
11/7/2020Red Tie Event Sale
11/6/2020Colours of Autumn
11/5/2020Stokrose Angus Ranch Bull Sale
11/4/2020McCabe Genetics Sale
11/3/2020Hawkeye Simmental Sale
11/1/2020WMC Production Sale
10/31/2020Black Hereford Ranch
10/31/2020Mayfield Angus : Field Day Online Auction
10/28/2020Micheli Ranch Annual Production Sale

View Sale Report

10/26/2020Tennessee River Music Sale
10/25/2020Vente de femelles SANE & invités
10/25/2020Bar 3 Angus
10/24/2020Vermont Waygu Production Sale
10/24/202044 Farms
10/24/2020Shelter Cattle Co & EZ Ranch Sale
10/22/2020Jansen Brothers
10/21/2020Texas Hereford & Red Alliance Sale
10/18/2020ANL Glenlees Polled Herefords & Guest
10/18/2020Six Mile Creek
10/18/2020Express Ranches Hereford Event
10/18/2020River Point Cattle Fall Feature
10/17/2020Whitestone Angus
10/17/2020Tennesse Fall Showcase
10/17/2020Elite Edge
10/17/2020NILE Angus Female Sale
10/17/2020Heart of Prairie Production Sale
10/17/2020Sandy Ridge Dispersal
10/16/2020Buckles and Banners
10/16/2020Wooden Shoe
10/16/2020Hicks Charolais
10/15/2020A Royal Affair - Black Herefords
10/15/2020Function and Finesse
10/15/2020Kirks Black Angus Ranch
10/14/2020Shaw Cattle Production Sale
10/14/2020Valley Oaks Fall Production Sale
10/13/20209 Peaks Ranch
10/13/2020Coleman Angus Production Sale
10/12/2020Doug Troop Hereford Farm & Guest
10/12/2020EZ Angus
10/11/2020Vintage Angus Ranch
10/11/2020Ridgeview Farm Definitely Different
10/10/2020Blackjack Farms & Guest Annual Sale
10/10/2020Mid Continent Farms 35th Annual Steer Sale
10/10/2020SoKy Select Gelbvieh Sale
10/10/2020Remitall West Production Sale
10/10/2020Family Legacies - Studer Shorthorns
10/10/2020Bonebreak Herefords
10/10/2020Judd Ranch Female Sale
10/10/2020Pleasant Hill Farms
10/9/2020Ladies of the Lone Star
10/9/2020Atlantic Classic Yearling Sale
10/9/2020Rockin' W Herefords Bull Sale

10/6/2020

Prime Harvest - Online Sale

10/5/2020

Fall Invitational Sale

10/5/2020

Express Ranches Fall Bull Sale

10/4/2020

Traynham Ranches Production Sale

10/4/2020

Cal Poly Bull Test Sale

10/4/2020

Quality Control IV

10/4/2020

Badger Souther Select Sale

10/3/2020

10th Annual Factory Direct Elite Female Sale

10/3/2020

Colyer Herefords & Angus Fall Female Sale

10/3/2020

Prime by Design 2 Bar Angus & Goode Angus

10/3/2020

Bridges Angus Farm Passion for ProgressView Sale Report
10/3/2020Breeders Classic Sale
10/3/2020Journagan Ranch / Missouri State Univeristy
10/2/2020Oklahoma Prime Registered Angus Female Sale
9/28/2020Hoffman Frozen Genetics & Female Sale
9/28/2020Gardiner Angus Ranch - 16th Annual Bull Sale
9/20/2020Churchhill Cattle Company

Results 2.0

Sale Reports are unofficial results of sales broadcasted by LiveAuctions.TV