Skip to content

Commit 37dd3a4

Browse files
committed
updates
1 parent dcce568 commit 37dd3a4

File tree

3 files changed

+40
-40
lines changed

3 files changed

+40
-40
lines changed

articles/active-directory/develop/mark-app-as-publisher-verified.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Microsoft identity platform accounts & tenant profiles on Android | Azure
3-
description: An overview of publisher verification for Microsoft identity platform.
2+
title: Mark an app as publisher verified
3+
description: Describes how to mark an app as publisher verified.
44
services: active-directory
55
author: rwike77
66
manager: CelesteDG
@@ -14,30 +14,30 @@ ms.custom: aaddev
1414
ms.reviewer: jesakowi
1515
---
1616

17-
# Publisher verfication
17+
# Publisher verification
1818
If you are already enrolled in the Microsoft Partner Network (MPN), you can get started right away:
1919

20-
1. Navigate to the preview version of the App Registration portal
20+
1. Navigate to the preview version of the App Registration portal.
2121

22-
1. Choose an app and click Branding
22+
1. Choose an app and click **Branding**.
2323

24-
1. Click Add MPN ID to verify publisher and review the listed requirements
24+
1. Click **Add MPN ID to verify publisher** and review the listed requirements.
2525

26-
1. Enter your MPN ID and click Verify and save
26+
1. Enter your MPN ID and click **Verify and save**.
2727

28-
For more details on specific benefits, requirements, etc. see Overview
28+
For more details on specific benefits, requirements, and frequent asked questions see the [overview](publisher-verification-overview.md).
2929

3030

3131
## Mark your app as publisher verified
32-
After you have ensured the above pre-requisites have been met, please follow the below to mark your app(s) as Publisher Verified.
32+
Make sure you have met the pre-requisites, then follow these steps to mark your app(s) as Publisher Verified.
3333

3434
1. Ensure you are signed in with an organizational (Azure AD) account that is authorized to make changes to the app(s) you want to mark as Publisher Verified and on the MPN Account in Partner Center.
3535

3636
1. In Azure AD this user must either be the Owner of the app or have one of the following roles: Application Admin, Cloud Application Admin, Global Admin.
3737

3838
1. In Partner Center this user must have of the following roles: MPN Admin, Accounts Admin, or a Global Admin (this is a shared role mastered in Azure AD).
3939

40-
1. Navigate to the preview version of the App Registration portal: <link>
40+
1. Navigate to the preview version of the App Registration portal:
4141

4242
1. Click on an app you would like to mark as Publisher Verified and open the Branding blade.
4343

@@ -47,25 +47,25 @@ After you have ensured the above pre-requisites have been met, please follow the
4747

4848
1. Match the domain of the email address used during the verification process for your MPN account.
4949

50-
1. Click Add MPN ID to verify publisher near the bottom of the page.
50+
1. Click **Add MPN ID to verify publisher** near the bottom of the page.
5151

52-
1. Enter your MPN ID. This MPN ID must be for:
52+
1. Enter your **MPN ID**. This MPN ID must be for:
5353

5454
1. A valid Microsoft Partner Network account that has completed the verification process.
5555

5656
1. The Partner global account (PGA) for your organization.
5757

58-
1. Click Verify and save.
58+
1. Click **Verify and save**.
5959

60-
1. Wait for the request to process- this may take a few minutes.
60+
1. Wait for the request to process, this may take a few minutes.
6161

62-
1. If the verification was successful, the publisher verification window will close, returning you to the Branding blade. You will see a blue verified badge next to your verified Publisher display name.
62+
1. If the verification was successful, the publisher verification window will close, returning you to the Branding blade. You will see a blue verified badge next to your verified **Publisher display name**.
6363

6464
1. Users who get prompted to consent to your app will start seeing the badge soon after you have gone through the process successfully, although it may take some time for this to replicate throughout the system.
6565

66-
1. Test this functionality by signing into your application and ensuring the verified badge shows up on the consent screen. If you are signed in as a user who has already granted consent to the app, you can use the prompt=consent query parameter to force a consent prompt.
66+
1. Test this functionality by signing into your application and ensuring the verified badge shows up on the consent screen. If you are signed in as a user who has already granted consent to the app, you can use the *prompt=consent* query parameter to force a consent prompt.
6767

68-
1. Repeat this process as needed for any additional apps you would like the badge to be displayed for. You can use Microsoft Graph to do this more quickly in bulk, and PowerShell cmdlets will be available soon. See Making Microsoft API Graph calls for more info.
68+
1. Repeat this process as needed for any additional apps you would like the badge to be displayed for. You can use Microsoft Graph to do this more quickly in bulk, and PowerShell cmdlets will be available soon. See [Making Microsoft API Graph calls](troubleshoot-publisher-verification.md#making-microsoft-graph-api-calls) for more info.
6969

7070
That’s it! Let us know if you have any feedback about the process, the results, or the feature in general.
7171

articles/active-directory/develop/publisher-verification-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Microsoft identity platform accounts & tenant profiles on Android | Azure
2+
title: Publisher verification overview
33
description: An overview of publisher verification for Microsoft identity platform.
44
services: active-directory
55
author: rwike77

articles/active-directory/develop/troubleshoot-publisher-verification.md

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Microsoft identity platform accounts & tenant profiles on Android | Azure
3-
description: An overview of publisher verification for Microsoft identity platform.
2+
title: Troubleshoot publisher verification
3+
description: Describles how to troubleshoot publisher verification for Microsoft identity platform.
44
services: active-directory
55
author: rwike77
66
manager: CelesteDG
@@ -14,16 +14,16 @@ ms.custom: aaddev
1414
ms.reviewer: jesakowi
1515
---
1616

17-
# Troubleshoot publisher verfication
18-
Please do the following if you are receiving errors or seeing unexpected behavior:
17+
# Troubleshoot publisher verification
18+
Do the following if you are receiving errors or seeing unexpected behavior:
1919

20-
1. See if your issue is covered in the [Frequently Asked Questions](publisher-verification-overview.md#frequently-asked-questions).
20+
1. See if your issue is covered in the [frequently asked questions](publisher-verification-overview.md#frequently-asked-questions).
2121

22-
1. Ensure that you have met all of the Requirements and are following the Step-by-Step Instructions.
22+
1. Ensure that you have met all of the [requirements](publisher-verification-overview.md#requirements) and are following the Step-by-Step Instructions.
2323

24-
If you are still unsure why the error is occurring, you can try making a request by Making Microsoft API Graph calls to gather additional and rule out any issues in the UI. Or, if you have access, you can use Internal Logs to troubleshoot further.
24+
If you are still unsure why the error is occurring, you can try making a request by [making Microsoft Graph API calls](#making-microsoft-graph-api-calls) to gather additional and rule out any issues in the UI. Or, if you have access, you can use [Internal Logs](#internal-logs) to troubleshoot further.
2525

26-
If you are still receiving an error from Microsoft Graph, please gather as much of the following information as possible related to the failing call and reach out to Microsoft:
26+
If you are still receiving an error from Microsoft Graph, gather as much of the following information as possible related to the failing call and reach out to Microsoft:
2727

2828
- Timestamp
2929
- CorrelationId
@@ -32,13 +32,13 @@ If you are still receiving an error from Microsoft Graph, please gather as much
3232
- REST request being made
3333
- Error code and message being returned
3434

35-
## Making Microsoft API Graph calls
35+
## Making Microsoft Graph API calls
3636

3737
If you are having an issue but unable to understand why based on what you are seeing in the UI, it may be helpful to perform further troubleshooting by using Microsoft Graph calls to perform the same operations you can perform in the App Registration portal. During the preview phase, these APIs will only be available on the /beta endpoint of Microsoft Graph.
3838

39-
The easiest way to make these requests is using Graph Explorer. You may also consider other options like using Postman, or using PowerShell to invoke a web request. PowerShell cmdlets will be available soon.
39+
The easiest way to make these requests is using [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer). You may also consider other options like using [Postman](https://www.postman.com/), or using PowerShell to [invoke a web request](/powershell/module/microsoft.powershell.utility/invoke-webrequest?view=powershell-7). PowerShell cmdlets will be available soon.
4040

41-
You can use Microsoft Graph to both set and unset your app’s Verified Publisher and check the result after performing one of these operations. The result can be seen on both the Application object corresponding to your app registration and any Service Principals that have been instantiated from that app. For more information on the relationship between those objects see: Application and service principal objects in Azure Active Directory.
41+
You can use Microsoft Graph to both set and unset your app’s Verified Publisher and check the result after performing one of these operations. The result can be seen on both the [application](/graph/api/resources/application?view=graph-rest-beta) object corresponding to your app registration and any [service principals](/graph/api/resources/serviceprincipal?view=graph-rest-beta) that have been instantiated from that app. For more information on the relationship between those objects, see: [Application and service principal objects in Azure Active Directory](app-objects-and-service-principals.md).
4242

4343
Here are examples of some useful requests:
4444

@@ -121,43 +121,43 @@ The following is a list of the potential error codes you may receive when troubl
121121

122122
HTTP 400
123123

124-
The MPN ID you provided (<MPNID>) does not exist, or you do not have access to it. Please provide a valid MPN ID and try again.
124+
The MPN ID you provided (<MPNID>) does not exist, or you do not have access to it. Provide a valid MPN ID and try again.
125125

126126
### MPNGlobalAccountNotFound
127127

128128
HTTP 400
129129

130-
The MPN ID you provided (<MPNID>) is not valid. Please provide a valid MPN ID and try again.
130+
The MPN ID you provided (<MPNID>) is not valid. Provide a valid MPN ID and try again.
131131

132132
### MPNAccountInvalid
133133

134134
HTTP 400
135135

136-
The MPN ID you provided (<MPNID>) is not valid. Please provide a valid MPN ID and try again.
136+
The MPN ID you provided (<MPNID>) is not valid. Provide a valid MPN ID and try again.
137137

138138
### MPNAccountNotVetted
139139

140140
HTTP 400
141141

142-
The MPN ID (<MPNID>) you provided has not completed the vetting process. Please complete this process in Partner Center and try again.
142+
The MPN ID (<MPNID>) you provided has not completed the vetting process. Complete this process in Partner Center and try again.
143143

144144
### NoPublisherIdOnAssociatedMPNAccount
145145

146146
HTTP 400
147147

148-
The MPN ID you provided (<MPNID>) is not valid. Please provide a valid MPN ID and try again.
148+
The MPN ID you provided (<MPNID>) is not valid. Provide a valid MPN ID and try again.
149149

150150
### MPNIdDoesNotMatchAssociatedMPNAccount
151151

152152
HTTP 400
153153

154-
The MPN ID you provided (<MPNID>) is not valid. Please provide a valid MPN ID and try again.
154+
The MPN ID you provided (<MPNID>) is not valid. Provide a valid MPN ID and try again.
155155

156156
### ApplicationNotFound
157157

158158
HTTP 404
159159

160-
The target application (<AppId>) cannot be found. Please provide a valid application id and try again.
160+
The target application (<AppId>) cannot be found. Provide a valid application ID and try again.
161161

162162
### B2CTenantNotAllowed
163163

@@ -175,13 +175,13 @@ This capability is not supported in an email verified tenant.
175175

176176
HTTP 400
177177

178-
The target application (<AppId>) does must have a Publisher Domain set. Please set a Publisher Domain and try again.
178+
The target application (<AppId>) does must have a Publisher Domain set. Set a Publisher Domain and try again.
179179

180180
### PublisherDomainIsNotDNSVerified
181181

182182
HTTP 400
183183

184-
The target application's Publisher Domain (<publisherDomain>) is not a verified domain in this tenant. Please verify a tenant domain using DNS verificaiton and try again.
184+
The target application's Publisher Domain (<publisherDomain>) is not a verified domain in this tenant. Verify a tenant domain using DNS verification and try again.
185185
### PublisherDomainMismatch
186186

187187
HTTP 400
@@ -198,15 +198,15 @@ You are not authorized to set the verified publisher property on application (<A
198198

199199
HTTP 400
200200

201-
The MPN Id was not provided in the request body or the request content type was not "application/json".
201+
The MPN ID was not provided in the request body or the request content type was not "application/json".
202202

203203
### MSANotSupported
204204

205205
HTTP 400
206206

207207
This feature is not supported for Microsoft consumer accounts. Only applications registered in Azure AD by an Azure AD user are supported.
208208

209-
## Internal Logs
209+
## Internal logs
210210

211211
### AAD Graph Logs
212212

0 commit comments

Comments
 (0)