Skip to content

Commit ea6b148

Browse files
authored
Merge pull request #177833 from alexbuckgit/alexbuckgit/docutune-autopr-20211027-194500-2447117
DocuTune: Fix incorrect uses of "a" and "an"
2 parents 37675bb + c7b0302 commit ea6b148

32 files changed

+49
-49
lines changed

articles/active-directory/cloud-sync/how-to-troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -181,7 +181,7 @@ There are two different ways to resolve a quarantine. They are:
181181

182182
To clear the watermark and run a delta sync on the provisioning job once you have verified it, simply right-click on the status and select **clear quarantine**.
183183

184-
You should see an notice that the quarantine is clearing.
184+
You should see a notice that the quarantine is clearing.
185185

186186
![Screenshot that shows the notice that the quarantine is clearing.](media/how-to-troubleshoot/quarantine-5.png)
187187

articles/active-directory/cloud-sync/reference-expressions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
# Writing expressions for attribute mappings in Azure Active Directory
1818
When you configure cloud sync, one of the types of attribute mappings that you can specify is an expression mapping.
1919

20-
The expression mapping allows you to customize attributes using a script-like expression. This allows you to transform the on-premises data into an new or different value. For example, you may want to combine two attributes into a single attribute because this single attribute is used by one of your cloud applications.
20+
The expression mapping allows you to customize attributes using a script-like expression. This allows you to transform the on-premises data into a new or different value. For example, you may want to combine two attributes into a single attribute because this single attribute is used by one of your cloud applications.
2121

2222
The following document will cover the script-like expressions that are used to transform the data. This is only part of the process. Next you will need to use this expression and place it in a web request to your tenant. For more information on that see [Transformations](how-to-transformation.md)
2323

@@ -812,4 +812,4 @@ Based on the user's first name, middle name and last name, you need to generate
812812
## Next steps
813813

814814
- [What is provisioning?](what-is-provisioning.md)
815-
- [What is Azure AD Connect cloud sync?](what-is-cloud-sync.md)
815+
- [What is Azure AD Connect cloud sync?](what-is-cloud-sync.md)

articles/active-directory/develop/migrate-adal-msal-java.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.date: 11/04/2019
1515
ms.author: marsma
1616
ms.reviewer: nacanuma, twhitney
1717
ms.custom: aaddev, devx-track-java, has-adal-ref
18-
#Customer intent: As an Java application developer, I want to learn how to migrate my v1 ADAL app to v2 MSAL.
18+
#Customer intent: As a Java application developer, I want to learn how to migrate my v1 ADAL app to v2 MSAL.
1919
---
2020

2121
# ADAL to MSAL migration guide for Java

articles/active-directory/develop/quickstart-create-new-tenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.date: 02/15/2021
1414
ms.author: ryanwi
1515
ms.reviewer: jmprieur
1616
ms.custom: aaddev, identityplatformtop40, fasttrack-edit
17-
#Customer intent: As an application developer, I need to create an Microsoft identity environment so I can use it to register applications.
17+
#Customer intent: As an application developer, I need to create a Microsoft identity environment so I can use it to register applications.
1818
---
1919

2020
# Quickstart: Set up a tenant

articles/active-directory/develop/quickstart-v2-nodejs-console.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.subservice: develop
1111
ms.topic: quickstart
1212
ms.date: 02/17/2021
1313
ms.author: karenhoran
14-
#Customer intent: As an application developer, I want to learn how my Node.js app can get an access token and call an API that is protected by an Microsoft identity platform endpoint using client credentials flow.
14+
#Customer intent: As an application developer, I want to learn how my Node.js app can get an access token and call an API that is protected by a Microsoft identity platform endpoint using client credentials flow.
1515
---
1616

1717
# Quickstart: Acquire a token and call Microsoft Graph API from a Node.js console app using app's identity
@@ -206,4 +206,4 @@ const tokenResponse = await cca.acquireTokenByClientCredential(tokenRequest);
206206
To learn more about daemon/console app development with MSAL Node, see the tutorial:
207207

208208
> [!div class="nextstepaction"]
209-
> [Daemon application that calls web APIs](tutorial-v2-nodejs-console.md)
209+
> [Daemon application that calls web APIs](tutorial-v2-nodejs-console.md)

articles/active-directory/develop/scenario-desktop-acquire-token-wam.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -137,7 +137,7 @@ Applications cannot remove accounts from Windows!
137137

138138
- WAM's interactive operations require being on the UI thread. MSAL throws a meaningful exception when not on UI thread. This does NOT apply to console apps.
139139
- `WithAccount` provides an accelerated authentication experience if the MSAL account was originally obtained via WAM, or, WAM can find a work and school account in Windows.
140-
- WAM is not able to pre-populate the username field with a login hint, unless an Work and School account with the same username is found in Windows.
140+
- WAM is not able to pre-populate the username field with a login hint, unless a Work and School account with the same username is found in Windows.
141141
- If WAM is unable to offer an accelerated authentication experience, it will show an account picker. Users can add new accounts.
142142

143143
!["WAM account picker"](media/scenario-desktop-acquire-token-wam/wam-account-picker.png)

articles/active-directory/develop/scenario-desktop-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ If you haven't already, create your first application by completing a quickstart
2727
- [Quickstart: Acquire a token and call Microsoft Graph API from a Windows desktop app](./quickstart-v2-windows-desktop.md)
2828
- [Quickstart: Acquire a token and call Microsoft Graph API from a UWP app](./quickstart-v2-uwp.md)
2929
- [Quickstart: Acquire a token and call Microsoft Graph API from a macOS native app](./quickstart-v2-ios.md)
30-
- [Quickstart: Acquire a token and call Microsoft Graph API from an Node.js & Electron app](./quickstart-v2-nodejs-desktop.md)
30+
- [Quickstart: Acquire a token and call Microsoft Graph API from a Node.js & Electron app](./quickstart-v2-nodejs-desktop.md)
3131

3232
## Overview
3333

articles/active-directory/enterprise-users/groups-dynamic-membership.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -264,7 +264,7 @@ assignedPlans is a multi-value property that lists all service plans assigned to
264264
user.assignedPlans -any (assignedPlan.servicePlanId -eq "efb87545-963c-4e0d-99df-69c6916d9eb0" -and assignedPlan.capabilityStatus -eq "Enabled")
265265
```
266266

267-
A rule such as this one can be used to group all users for whom an Microsoft 365 (or other Microsoft Online Service) capability is enabled. You could then apply with a set of policies to the group.
267+
A rule such as this one can be used to group all users for whom a Microsoft 365 (or other Microsoft Online Service) capability is enabled. You could then apply with a set of policies to the group.
268268

269269
#### Example 2
270270

articles/active-directory/enterprise-users/groups-lifecycle.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ The following are roles that can configure and use expiration for Microsoft 365
6464
Role | Permissions
6565
-------- | --------
6666
Global administrator, Group administrator, or User administrator | Can create, read, update, or delete the Microsoft 365 groups expiration policy settings<br>Can renew any Microsoft 365 group
67-
User | Can renew an Microsoft 365 group that they own<br>Can restore an Microsoft 365 group that they own<br>Can read the expiration policy settings
67+
User | Can renew a Microsoft 365 group that they own<br>Can restore a Microsoft 365 group that they own<br>Can read the expiration policy settings
6868

6969
For more information on permissions to restore a deleted group, see [Restore a deleted Microsoft 365 group in Azure Active Directory](groups-restore-deleted.md).
7070

@@ -113,7 +113,7 @@ If the group you're restoring contains documents, SharePoint sites, or other per
113113

114114
## How to retrieve Microsoft 365 group expiration date
115115

116-
In addition to Access Panel where users can view group details including expiration date and last renewed date, expiration date of an Microsoft 365 group can be retrieved from Microsoft Graph REST API Beta. expirationDateTime as a group property has been enabled in Microsoft Graph Beta. It can be retrieved with a GET request. For more details, please refer to [this example](/graph/api/group-get?view=graph-rest-beta#example&preserve-view=true).
116+
In addition to Access Panel where users can view group details including expiration date and last renewed date, expiration date of a Microsoft 365 group can be retrieved from Microsoft Graph REST API Beta. expirationDateTime as a group property has been enabled in Microsoft Graph Beta. It can be retrieved with a GET request. For more details, please refer to [this example](/graph/api/group-get?view=graph-rest-beta#example&preserve-view=true).
117117

118118
> [!NOTE]
119119
> In order to manage group memberships on Access Panel, "Restrict access to Groups in Access Panel" needs to be set to "No" in Azure Active Directory Groups General Setting.

articles/active-directory/enterprise-users/groups-restore-deleted.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,10 +16,10 @@ ms.collection: M365-identity-device-management
1616
---
1717
# Restore a deleted Microsoft 365 group in Azure Active Directory
1818

19-
When you delete an Microsoft 365 group in the Azure Active Directory (Azure AD), the deleted group is retained but not visible for 30 days from the deletion date. This behavior is so that the group and its contents can be restored if needed. This functionality is restricted exclusively to Microsoft 365 groups in Azure AD. It is not available for security groups and distribution groups. Please note that the 30-day group restoration period is not customizable.
19+
When you delete a Microsoft 365 group in the Azure Active Directory (Azure AD), the deleted group is retained but not visible for 30 days from the deletion date. This behavior is so that the group and its contents can be restored if needed. This functionality is restricted exclusively to Microsoft 365 groups in Azure AD. It is not available for security groups and distribution groups. Please note that the 30-day group restoration period is not customizable.
2020

2121
> [!NOTE]
22-
> Don't use `Remove-MsolGroup` because it purges the group permanently. Always use `Remove-AzureADMSGroup` to delete an Microsoft 365 group.
22+
> Don't use `Remove-MsolGroup` because it purges the group permanently. Always use `Remove-AzureADMSGroup` to delete a Microsoft 365 group.
2323
2424
The permissions required to restore a group can be any of the following:
2525

@@ -79,7 +79,7 @@ Once you have verified that the group is still available to restore, restore the
7979
8080
## How do you know this worked?
8181
82-
To verify that you’ve successfully restored an Microsoft 365 group, run the `Get-AzureADGroup –ObjectId <objectId>` cmdlet to display information about the group. After the restore request is completed:
82+
To verify that you’ve successfully restored a Microsoft 365 group, run the `Get-AzureADGroup –ObjectId <objectId>` cmdlet to display information about the group. After the restore request is completed:
8383
8484
- The group appears in the Left navigation bar on Exchange
8585
- The plan for the group will appear in Planner

0 commit comments

Comments
 (0)