Skip to content

Commit 3920d27

Browse files
committed
acrolinx
1 parent 3876ff5 commit 3920d27

File tree

2 files changed

+7
-10
lines changed

2 files changed

+7
-10
lines changed

articles/active-directory/develop/active-directory-devhowto-adal-error-handling.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ Fundamentally, there are two cases of AcquireTokenSilent errors:
5151
| Case | Description |
5252
|------|-------------|
5353
| **Case 1**: Error is resolvable with an interactive sign-in | For errors caused by a lack of valid tokens, an interactive request is necessary. Specifically, cache lookup and an invalid/expired refresh token require an AcquireToken call to resolve.<br><br>In these cases, the end user needs to be prompted to sign in. The application can choose to do an interactive request immediately, after end-user interaction (such as hitting a sign-in button), or later. The choice depends on the desired behavior of the application.<br><br>See the code in the following section for this specific case and the errors that diagnose it.|
54-
| **Case 2**: Error is not resolvable with an interactive sign-in | For network and transient/temporary errors, or other failures, performing an interactive AcquireToken request does not resolve the issue. Unnecessary interactive sign-in prompts can also frustrate end users. ADAL automatically attempts a single retry for most errors on AcquireTokenSilent failures.<br><br>The client application can also attempt a retry at some later point, but when and how to do it is dependent on the application behavior and desired end-user experience. For example, the application can do an AcquireTokenSilent retry after a few minutes, or in response to some end-user action. An immediate retry will result in the application being throttled, and should not be attempted.<br><br>A subsequent retry failing with the same error does not mean the client should do an interactive request using AcquireToken, as it does not resolve the error.<br><br>See the code in the following section for this specific case and the errors that diagnose it. |
54+
| **Case 2**: Error is not resolvable with an interactive sign-in | For network and transient/temporary errors, or other failures, performing an interactive AcquireToken request does not resolve the issue. Unnecessary interactive sign-in prompts can also frustrate end users. ADAL automatically attempts a single retry for most errors on AcquireTokenSilent failures.<br><br>The client application can also attempt a retry at some later point, but when and how is dependent on the application behavior and desired end-user experience. For example, the application can do an AcquireTokenSilent retry after a few minutes, or in response to some end-user action. An immediate retry will result in the application being throttled, and should not be attempted.<br><br>A subsequent retry failing with the same error does not mean the client should do an interactive request using AcquireToken, as it does not resolve the error.<br><br>See the code in the following section for this specific case and the errors that diagnose it. |
5555

5656
### .NET
5757

@@ -196,7 +196,7 @@ Error handling in native applications can be defined by two cases:
196196
197197
| | |
198198
|------|-------------|
199-
| **Case 1**:<br>Non-Retryable Error (most cases) | 1. Do not attempt immediate retry. Present the end-user UI based on the specific error that invokes a retry ("Try to Sign in again", "Download Azure AD broker application", etc). |
199+
| **Case 1**:<br>Non-Retryable Error (most cases) | 1. Do not attempt immediate retry. Present the end-user UI based on the specific error that invokes a retry (for example, "Try to Sign in again" or "Download Azure AD broker application"). |
200200
| **Case 2**:<br>Retryable Error | 1. Perform a single retry as the end user may have entered a state that results in a success.<br><br>2. If retry fails, present the end-user UI based on the specific error that invokes a retry ("Try to Sign in again", "Download Azure AD broker app", etc.). |
201201
202202
> [!IMPORTANT]
@@ -208,9 +208,9 @@ Error handling in native applications can be defined by two cases:
208208
The following guidance provides examples for error handling in conjunction with all non-silent AcquireToken(…) ADAL methods, *except*:
209209
210210
- AcquireTokenAsync(…, IClientAssertionCertification, …)
211-
- AcquireTokenAsync(…,ClientCredential, …)
212-
- AcquireTokenAsync(…,ClientAssertion, …)
213-
- AcquireTokenAsync(…,UserAssertion,…)
211+
- AcquireTokenAsync(…, ClientCredential, …)
212+
- AcquireTokenAsync(…, ClientAssertion, …)
213+
- AcquireTokenAsync(…, UserAssertion,…)
214214
215215
Your code would be implemented as follows:
216216
@@ -478,8 +478,8 @@ We've built a [complete sample](https://github.com/Azure-Samples/active-director
478478
479479
## Error and logging reference
480480
481-
### Logging Personal Identifiable Information (PII) & Organizational Identifiable Information (OII)
482-
By default, ADAL logging does not capture or log any PII or OII. The library allows app developers to turn this on through a setter in the Logger class. By turning on PII or OII, the app takes responsibility for safely handling highly-sensitive data and complying with any regulatory requirements.
481+
### Logging Personal Identifiable Information & Organizational Identifiable Information
482+
By default, ADAL logging does not capture or log any personal identifiable information or organizational identifiable information. The library allows app developers to turn this on through a setter in the Logger class. By logging personal identifiable information or organizational identifiable information, the app takes responsibility for safely handling highly sensitive data and complying with any regulatory requirements.
483483
484484
### .NET
485485

articles/active-directory/develop/v1-authentication-scenarios.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -69,11 +69,8 @@ Depending on how your client is built, it can use one (or several) of the authen
6969
|[On-behalf-of flow](v1-oauth2-on-behalf-of-flow.md) | access token| x| x| x| |
7070
|[Client credentials](v1-oauth2-client-creds-grant-flow.md) | | | x (app-only)| | |
7171

72-
**Notes**:
73-
7472
Tokens issued via the implicit mode have a length limitation due to being passed back to the browser via the URL (where `response_mode` is `query` or `fragment`). Some browsers have a limit on the size of the URL that can be put in the browser bar and fail when it is too long. Thus, these tokens do not have `groups` or `wids` claims.
7573

76-
7774
Now that you have an overview of the basics, read on to understand the identity app model and API, how provisioning works in Microsoft identity platform, and links to detailed info about the common scenarios that Microsoft identity platform supports.
7875

7976
## Application model

0 commit comments

Comments
 (0)