Skip to content

Commit fc77bd8

Browse files
committed
cleanup
1 parent 1ec44e2 commit fc77bd8

File tree

3 files changed

+8
-5
lines changed

3 files changed

+8
-5
lines changed

articles/active-directory/reports-monitoring/recommendation-remove-unused-apps.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,8 +37,7 @@ Applications that the recommendation identified appear in the list of **Impacted
3737

3838
1. Determine if the identified application is needed.
3939
- If the application is no longer needed, remove it from your tenant.
40-
- If the application is needed, we suggest you take appropriate steps to ensure the application isn't used in intervals of more than 30 days.
41-
- We recommend updating the frequency of access such that the application’s last used time is within 30 days from its last access date.
40+
- If the application is needed, we suggest you take appropriate steps to ensure the application is used in intervals of less than 30 days.
4241

4342
## Known limitations
4443

articles/active-directory/reports-monitoring/recommendation-remove-unused-credential-from-apps.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,11 +49,12 @@ Applications that the recommendation identified appear in the list of **Impacted
4949

5050
### Use Microsoft Graph to remove an unused credential
5151

52-
To get started, see [How to use Microsoft Graph with Azure AD recommendations](howto-use-recommendations.md#how-to-use-microsoft-graph-with-azure-active-directory-recommendations).
52+
You can use Microsoft Graph to remove an unused credential programmatically. To get started, see [How to use Microsoft Graph with Azure AD recommendations](howto-use-recommendations.md#how-to-use-microsoft-graph-with-azure-active-directory-recommendations).
5353

5454
- Remove a **credential** from a service principal resource:
5555
- Use the Microsoft Graph Service Principal API service action `removePassword`
5656
- [servicePrincipal: removePassword MS Graph API documentation](/graph/api/serviceprincipal-removepassword?view=graph-rest-beta&preserve-view=true)
57+
5758
- Remove a **key credential** from a service principal resource:
5859
- Use the Microsoft Graph Service Principal API service action `removeKey`
5960
- [servicePrincipal: removeKey MS Graph API documentation](/graph/api/serviceprincipal-removekey?view=graph-rest-beta&preserve-view=true)

articles/active-directory/reports-monitoring/recommendation-renew-expiring-service-principal-credential.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,12 +49,15 @@ Renewing the service principal credential(s) before expiration ensures the appli
4949

5050
### Use Microsoft Graph to renew expiring service principal credentials
5151

52-
To get started, see [How to use Microsoft Graph with Azure AD recommendations](howto-use-recommendations.md#how-to-use-microsoft-graph-with-azure-active-directory-recommendations).
52+
You can use Microsoft Graph to renew expiring service credentials programmatically. To get started, see [How to use Microsoft Graph with Azure AD recommendations](howto-use-recommendations.md#how-to-use-microsoft-graph-with-azure-active-directory-recommendations).
5353

5454
When renewing service principal credentials using Microsoft Graph, you need to run a query to get the password credentials on a service principal, add a new password credential, then remove the old credentials.
5555

5656
1. Run the following query in Microsoft Graph to get the password credentials on a service principal:
57-
- https://graph.microsoft.com/v1.0/servicePrincipals/{id}?$select=passwordCredentials
57+
58+
```http
59+
https://graph.microsoft.com/v1.0/servicePrincipals/{id}?$select=passwordCredentials
60+
```
5861
- Replace {id} with the service principal ID.
5962
6063
1. Add a new password credential.

0 commit comments

Comments
 (0)