Skip to content

Commit faeaf5a

Browse files
authored
Merge pull request #46751 from schneiderl/master
multiple files: fix typos
2 parents 7190d7c + 41e709a commit faeaf5a

File tree

73 files changed

+85
-85
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

73 files changed

+85
-85
lines changed

articles/active-directory-b2c/active-directory-b2c-reference-audit-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -161,7 +161,7 @@ Write-Output "Searching for events starting $7daysago"
161161
$body = @{grant_type="client_credentials";resource=$resource;client_id=$ClientID;client_secret=$ClientSecret}
162162
$oauth = Invoke-RestMethod -Method Post -Uri $loginURL/$tenantdomain/oauth2/token?api-version=1.0 -Body $body
163163
164-
# Parse audit report items, save output to file(s): auditX.json, where X = 0 thru n for number of nextLink pages
164+
# Parse audit report items, save output to file(s): auditX.json, where X = 0 through n for number of nextLink pages
165165
if ($oauth.access_token -ne $null) {
166166
$i=0
167167
$headerParams = @{'Authorization'="$($oauth.token_type) $($oauth.access_token)"}

articles/active-directory-b2c/claimsschema.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -364,7 +364,7 @@ The **Paragraph** user input type is used to provide a field that shows text onl
364364
<UserHelpText>A claim responsible for holding response messages to send to the relying party</UserHelpText>
365365
<UserInputType>Paragraph</UserInputType>
366366
<Restriction>
367-
<Enumeration Text="B2C_V1_90001" Value="You cant sign in because you are a minor" />
367+
<Enumeration Text="B2C_V1_90001" Value="You cannot sign in because you are a minor" />
368368
<Enumeration Text="B2C_V1_90002" Value="This action can only be performed by gold members" />
369369
<Enumeration Text="B2C_V1_90003" Value="You have not been enabled for this operation" />
370370
</Restriction>

articles/active-directory-b2c/string-transformations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -375,7 +375,7 @@ The following example looks up the error message description based on the error
375375
<DataType>string</DataType>
376376
<UserInputType>Paragraph</UserInputType>
377377
<Restriction>
378-
<Enumeration Text="B2C_V1_90001" Value="You cant sign in because you are a minor" />
378+
<Enumeration Text="B2C_V1_90001" Value="You cannot sign in because you are a minor" />
379379
<Enumeration Text="B2C_V1_90002" Value="This action can only be performed by gold members" />
380380
<Enumeration Text="B2C_V1_90003" Value="You have not been enabled for this operation" />
381381
</Restriction>
@@ -399,7 +399,7 @@ The claims transformation looks up the text of the item and returns its value. I
399399
- Input claims:
400400
- **mapFromClaim**: B2C_V1_90001
401401
- Output claims:
402-
- **restrictionValueClaim**: You cant sign in because you are a minor.
402+
- **restrictionValueClaim**: You cannot sign in because you are a minor.
403403

404404
## LookupValue
405405

articles/active-directory/authentication/howto-mfa-nps-extension.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -270,7 +270,7 @@ Valid-From and Valid-Until timestamps, which are in human-readable form, can be
270270

271271
---
272272

273-
### Why cant I sign in?
273+
### Why cannot I sign in?
274274

275275
Check that your password hasn't expired. The NPS Extension does not support changing passwords as part of the sign-in workflow. Contact your organization's IT Staff for further assistance.
276276

articles/active-directory/cloud-provisioning/what-is-provisioning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717

1818
Today, businesses, and corporations are becoming more and more a mixture of on-premises and cloud applications. Users require access to applications both on-premises and in the cloud. There is need to have a single identity across these various applications (on-premises as well as cloud).
1919

20-
Provisioning is the process of creating an object based on certain conditions, keeping the object upto date and deleting the object when conditions are no longer met. For example, when a new user joins your organization, that user is entered in to the HR system. At that point, provisioning can create a corresponding user account in the cloud, in Active Directory, and different applications that the user needs access to. This allows the user to start work and have access to the applications and systems they need on day one.
20+
Provisioning is the process of creating an object based on certain conditions, keeping the object up to date and deleting the object when conditions are no longer met. For example, when a new user joins your organization, that user is entered in to the HR system. At that point, provisioning can create a corresponding user account in the cloud, in Active Directory, and different applications that the user needs access to. This allows the user to start work and have access to the applications and systems they need on day one.
2121

2222
![cloud provisioning](media/what-is-provisioning/cloud1.png)
2323

articles/active-directory/develop/azure-ad-endpoint-comparison.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ These scopes allow you to code your app in a minimal-disclosure fashion so you c
109109
The Microsoft identity platform endpoint issues a smaller set of claims in its tokens by default to keep payloads small. If you have apps and services that have a dependency on a particular claim in a v1.0 token that is no longer provided by default in a Microsoft identity platform token, consider using the [optional claims](active-directory-optional-claims.md) feature to include that claim.
110110

111111
> [!IMPORTANT]
112-
> v1.0 and v2.0 tokens can be issued by both the v1.0 and v2.0 endpoints! id_tokens *always* match the endpoint they're requested from, and access tokens *always* match the format expected by the Web API your client will call using that token. So if your app uses the v2.0 endpoint to get a token to call Microsoft Graph, which expects v1.0 format access tokens, your app will recieve a token in the v1.0 format.
112+
> v1.0 and v2.0 tokens can be issued by both the v1.0 and v2.0 endpoints! id_tokens *always* match the endpoint they're requested from, and access tokens *always* match the format expected by the Web API your client will call using that token. So if your app uses the v2.0 endpoint to get a token to call Microsoft Graph, which expects v1.0 format access tokens, your app will receive a token in the v1.0 format.
113113
114114
## Limitations
115115

articles/active-directory/develop/sso-between-adal-msal-apps-macos-ios.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -168,7 +168,7 @@ MSAL supported account lookup APIs:
168168
/*!
169169
Returns account for the given account identifier (received from an account object returned in a previous acquireToken call)
170170
171-
@param error The error that occured trying to get the accounts, if any, if you're
171+
@param error The error that occurred trying to get the accounts, if any, if you're
172172
not interested in the specific error pass in nil.
173173
*/
174174
- (nullable MSALAccount *)accountForIdentifier:(nonnull NSString *)identifier
@@ -178,7 +178,7 @@ MSAL supported account lookup APIs:
178178
Returns account for for the given username (received from an account object returned in a previous acquireToken call or ADAL)
179179
180180
@param username The displayable value in UserPrincipleName(UPN) format
181-
@param error The error that occured trying to get the accounts, if any, if you're
181+
@param error The error that occurred trying to get the accounts, if any, if you're
182182
not interested in the specific error pass in nil.
183183
*/
184184
- (MSALAccount *)accountForUsername:(NSString *)username

articles/active-directory/reports-monitoring/concept-audit-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ This article gives you an overview of the audit report.
4242

4343
## Audit logs
4444

45-
The Azure AD audit logs provide records of system activities for compliance. To access the audit report, select **Audit logs** in the **Activity** section of **Azure Active Directory**. Note that audit logs may have a latency of upto an hour, so it may take that long for audit activity data to show up in the portal after you have completed the task.
45+
The Azure AD audit logs provide records of system activities for compliance. To access the audit report, select **Audit logs** in the **Activity** section of **Azure Active Directory**. Note that audit logs may have a latency of up to an hour, so it may take that long for audit activity data to show up in the portal after you have completed the task.
4646

4747

4848

articles/active-directory/saas-apps/acquireio-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
139139

140140
![AcquireIO configuration](./media/acquireio-tutorial/config01.png)
141141

142-
1. Scroll down upto **Active Directory** and click on **Install**.
142+
1. Scroll down up to **Active Directory** and click on **Install**.
143143

144144
![AcquireIO configuration](./media/acquireio-tutorial/config02.png)
145145

articles/active-directory/saas-apps/salesforce-provisioning-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ For more information on how to read the Azure AD provisioning logs, see [Reporti
123123
* The Azure AD provisioning service supports provisioning language, locale, and timeZone for a user. These attributes are in the default attribute mappings but do not have a default source attribute. Ensure that you select the default source attribute and that the source attribute is in the format expected by SalesForce. For example, localeSidKey for english(UnitedStates) is en_US. Review the guidance provided [here](https://help.salesforce.com/articleView?id=setting_your_language.htm&type=5) to determine the proper localeSidKey format. The languageLocaleKey formats can be found [here](https://help.salesforce.com/articleView?id=faq_getstart_what_languages_does.htm&type=5). In addition to ensuring that the format is correct, you may need to ensure that the language is enabled for your users as described [here](https://help.salesforce.com/articleView?id=setting_your_language.htm&type=5).
124124
* **SalesforceLicenseLimitExceeded:** The user could not be created in the target application because there are no available licenses for this user. Either procure additional licenses for the target application, or review your user assignments and attribute mapping configuration to ensure that the correct users are assigned with the correct attributes.
125125
* **SalesforceDuplicateUserName:** The user cannot be provisioned because it has a Salesforce.com 'Username' that is duplicated in another Salesforce.com tenant.  In Salesforce.com, values for the 'Username' attribute must be unique across all Salesforce.com tenants.  By default, a user’s userPrincipalName in Azure Active Directory becomes their 'Username' in Salesforce.com.  You have two options.  One option is to find and rename the user with the duplicate 'Username' in the other Salesforce.com tenant, if you administer that other tenant as well.  The other option is to remove access from the Azure Active Directory user to the Salesforce.com tenant with which your directory is integrated. We will retry this operation on the next synchronization attempt.
126-
* **SalesforceRequiredFieldMissing:** Salesforce requires certain attributes to be present on the user to succesfuly create or update the user. This user is missing one of the required attributes. Ensure that attributes such as email and alias are populated on all users that you would like to be provisioned into Salesforce. You can scope users that don't have these attributes out using [attribute based scoping filters](https://docs.microsoft.com/azure/active-directory/manage-apps/define-conditional-rules-for-provisioning-user-accounts).
126+
* **SalesforceRequiredFieldMissing:** Salesforce requires certain attributes to be present on the user to successfully create or update the user. This user is missing one of the required attributes. Ensure that attributes such as email and alias are populated on all users that you would like to be provisioned into Salesforce. You can scope users that don't have these attributes out using [attribute based scoping filters](https://docs.microsoft.com/azure/active-directory/manage-apps/define-conditional-rules-for-provisioning-user-accounts).
127127
* The default attribute mapping for provisioning to Salesforce includes the SingleAppRoleAssignments expression to map appRoleAssignments in Azure AD to ProfileName in Salesforce. Ensure that the users do not have multiple app role assignments in Azure AD as the attribute mapping only supports provisioning one role.
128128
* Salesforce requires that email updates be approved manually before being changed. As a result, you may see multiple entries in the provisioning logs to update the user's email (until the email change has been approved).
129129

0 commit comments

Comments
 (0)