Skip to content

Commit f3fabf5

Browse files
authored
Fix 'ad-hoc' to 'ad hoc' in documentation
Corrected the term 'ad-hoc' to 'ad hoc' in multiple instances for consistency.
1 parent 45d00b6 commit f3fabf5

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

docs/organizations/accounts/use-personal-access-tokens-to-authenticate.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ Your PAT serves as your digital identity, much like a password. You can use PATs
102102

103103
After your app code is working, switch to [Microsoft Entra OAuth to acquire tokens for your app's users](../../integrate/get-started/authentication/entra-oauth.md) or a [service principal or managed identity to acquire tokens as an application](../../integrate/get-started/authentication/service-principal-managed-identity.md). We don't recommend that you keep running apps or scripts with PATs long term. You can use Microsoft Entra tokens anywhere that a PAT is used.
104104

105-
Consider [acquiring a Microsoft Entra token via the Azure CLI](../../cli/entra-tokens.md) for ad-hoc requests.
105+
Consider [acquiring a Microsoft Entra token via the Azure CLI](../../cli/entra-tokens.md) for ad hoc requests.
106106

107107
### [Windows](#tab/Windows/)
108108

@@ -191,7 +191,7 @@ If you're using a PAT issued before that data, regenerate your PAT. If you integ
191191

192192
### Consider alternatives
193193

194-
* Acquire a Microsoft Entra token via the [Azure CLI](../../cli/entra-tokens.md) for ad-hoc requests instead of minting a longer-lived PAT.
194+
* Acquire a Microsoft Entra token via the [Azure CLI](../../cli/entra-tokens.md) for ad hoc requests instead of minting a longer-lived PAT.
195195
* Use credential managers like [Git Credential Manager](https://github.com/git-ecosystem/git-credential-manager) or [Azure Artifacts Credential Manager](https://github.com/microsoft/artifacts-credprovider) to simplify credential management, with authentication set to `oauth` or Microsoft Entra tokens.
196196

197197
### Create PATs
@@ -224,7 +224,7 @@ A. Sign in to the organization where your PAT is scoped. You can view your PATs
224224

225225
### Q. What happens to a PAT if a user account is disabled?
226226

227-
A. When a user is removed from Azure DevOps, the PAT invalidates within one hour. If your organization is connected to Microsoft Entra ID, the PAT also invalidates in Microsoft Entra ID because it belongs to the user. We recommend that you rotate the PAT to another user or service account to keep services running.
227+
A. When a user is removed from Azure DevOps, the PAT is invalidated within one hour. If your organization is connected to Microsoft Entra ID, the PAT is also invalidated in Microsoft Entra ID because it belongs to the user. We recommend that you rotate the PAT to another user or service account to keep services running.
228228

229229
### Q. Can I use PATs with all Azure DevOps REST APIs?
230230

0 commit comments

Comments
 (0)