Skip to content

Commit 0edb14d

Browse files
authored
Update
1 parent d9ae44d commit 0edb14d

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

support/entra/entra-id/app-integration/android-app-authentication-fails-after-published-to-google-play-store.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
title: Android App Authentication Fails After Being Published to Google Play Store
3-
description: Provides a solution to an authentication failure with an Android app that's published to the Google Play Store.
3+
description: Provides a solution to an authentication failure with an Android app published to the Google Play Store.
44
ms.reviewer: markbukovich, v-weizhu
55
ms.service: entra-id
66
ms.date: 02/19/2025
77
ms.custom: sap:Developing or Registering apps with Microsoft identity platform
88
---
99
# Authentication fails after an Android app is published to the Google Play Store
1010

11-
This article provides a solution to an authentication failure that occurs during signing in after users install an Android app that's published to the Google Play Store.
11+
This article provides a solution to an authentication failure that occurs during signing in after users install an Android app published to the Google Play Store.
1212

1313
## Symptoms
1414

@@ -56,7 +56,7 @@ To get the signature hash from the Google Play Console, follow these steps:
5656

5757
1. Go to the Google Play Console and sign in with your Google Developer account.
5858
2. Once you're in the Google Play Console, select the affected app.
59-
3. On the left navigation, under the **Release** category, expand **Setup** and select **App Integrity**.
59+
3. On the left navigation, under the **Release** category, expand **Setup**, and select **App Integrity**.
6060
4. Select the **App signing** tab. You'll see the fingerprint of the app signing key in three different variations.
6161
5. Copy the **SHA-1 certificate fingerprint** and paste it into the PowerShell script in step 6 as the value of the `$Thumbprint` variable.
6262
6. Run the following script to obtain the base64 encoded fingerprint that MSAL needs:

0 commit comments

Comments
 (0)