Skip to content

Commit 2965b47

Browse files
committed
Merge branch 'main' of https://github.com/microsoftdocs/memdocs-pr into 12724154-cp-remote-help-logging
2 parents 91d1f5c + 7b8cac7 commit 2965b47

2 files changed

Lines changed: 7 additions & 5 deletions

File tree

memdocs/intune/fundamentals/in-development.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -72,8 +72,6 @@ End users will be able to more easily see the compliance status of their devices
7272
### Password complexity for Android devices<!-- 9321870 -->
7373
The **Require device lock** setting in Intune will be extended to include values (**Low Complexity**, **Medium Complexity**, and **High Complexity**). If the device lock doesn’t meet the minimum password requirement, you will be able to **warn**, **wipe data**, or **block** the end user from accessing a managed account in a managed app. This feature targets devices that operate on Android 11+. For devices operating on Android 10 and earlier, setting a complexity value of **Low**, **Medium**, or **High** will default to the expected behavior for **Low Complexity**. For related information, see [Android app protection policy settings in Microsoft Intune](..\apps\app-protection-policy-settings-android.md).
7474

75-
### Unified delivery of Azure AD Enterprise and Office Online applications in the Android Company Portal<!-- 1817862 -->
76-
7775
<!-- ***********************************************-->
7876

7977
## Device security

memdocs/intune/protect/certificate-authority-add-scep-overview.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -113,6 +113,12 @@ Be sure you have the required permissions to register an Azure AD app. See [Requ
113113
2. Expand **Application** and select the checkbox for **Application.Read.All** (Read all applications).
114114
3. Select **Add permissions** to save this configuration.
115115

116+
1. Select **Add a permission** again.
117+
1. On the *Request API permissions* page, select **Azure Active Directory Graph** > **Application permissions**.
118+
2. Expand **Application** and select the checkbox for **Application.Read.All** (Read all applications).
119+
3. Select **Add permissions** to save this configuration.
120+
121+
<!-- Pending review to replace step 7.c>
116122
1. Use *Microsoft Graph* to add the following permissions to the app:
117123
118124
- **Application.Read.All** (Read all applications).
@@ -121,9 +127,7 @@ Be sure you have the required permissions to register an Azure AD app. See [Requ
121127
122128
> [!NOTE]
123129
> Previously, these permissions were configured by using Azure AD Graph, and available through the App registration UI. Azure AD Graph is now deprecated and will be retired on June 30, 2022. As part of this deprecation path, the capability to add Azure AD Graph permissions to the required permissions for an app registration through the Azure portal is now disabled.
124-
>
125-
> In addition to using the information at [Configure Azure AD Graph permissions](/graph/migrate-azure-ad-graph-configure-permissions) to set permission on the app, we recommend that you follow the [App migration planning checklist](/graph/migrate-azure-ad-graph-planning-checklist) to help you transition your apps to the [Microsoft Graph](/graph/overview) API.
126-
130+
-->
127131
8. Remain on the **API permissions** page, and select **Grant admin consent for** ***\<your tenant>***, and then select **Yes**.
128132

129133
The app registration process in Azure AD is complete.

0 commit comments

Comments
 (0)