You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/developer/app-sdk-android-phase4.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -447,11 +447,11 @@ Execute the following test first to get familiar with the complete end user expe
447
447
-> [!TIP]
448
448
> Uninstalling other SDK-integrated apps helps ensure that you're exclusively testing your own app's integration.
449
449
5. Install your application.
450
-
6. Log into your application with your test account that is targeted with App Protection Policy.
450
+
6. Log in to your application with your test account that is targeted with App Protection Policy.
451
451
7. Confirm that you're prompted to install the Intune Company Portal from Google Play.
452
452
-> [!NOTE]
453
453
> If your test device does not have the Google Play Store app, confirm you are prompted to install the Intune Company Portal from either another app store or a Microsoft website.
454
-
8. Install the Company Portal. You don't need to launch the Company Portal or log into the Company Portal.
454
+
8. Install the Company Portal. You don't need to launch the Company Portal or log in to the Company Portal.
455
455
9. Return to your app and log in again, if necessary.
456
456
10. Confirm that you're prompted with a Get Access screen. This indicates that the SDK has successfully retrieved policy for this account.
457
457
11. You should be prompted to set an app PIN. Create a PIN.
@@ -474,8 +474,8 @@ For these tests:
474
474
2. Install the Intune Company Portal.
475
475
3. Install another managed app, targeted with the same policy as your app, that can copy and paste data (like Microsoft Office).
476
476
4. Install (or reuse) any unmanaged app that can copy and paste data.
477
-
5. Log into your app with the test managed account.
478
-
6. Log into the other managed app with the managed test account.
477
+
5. Log in to your app with the test managed account.
478
+
6. Log in to the other managed app with the managed test account.
Copy file name to clipboardExpand all lines: memdocs/intune/developer/app-sdk-android-phase6.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -189,11 +189,11 @@ To validate that Intune is properly delivering app configuration policy:
189
189
- If your app supports app configuration for managed devices, see [application configuration policies for managed Android Enterprise devices].
190
190
- If your app supports app configuration for managed apps, see [application configuration policies for managed apps].
191
191
- If your app supports both types of app configuration, create both types of policy for testing.
192
-
2. Log into your app with your test account.
192
+
2. Log in to your app with your test account.
193
193
- For managed devices, see [Android enterprise app configuration policies] and [Enroll Android devices].
194
194
- For managed apps:
195
195
1. Install both your app and the Intune Company Portal.
196
-
2. Log into your app with your test account.
196
+
2. Log in to your app with your test account.
197
197
3. Navigate through your app to exercise each codepath that calls `MAMAppConfigManager`'s `getAppConfig` or `getFullData`.
198
198
- Logging the results of calls to `getAppConfig` is a simple way to validate which settings are delivered. However, because administrators can enter any data for app configuration settings, be careful not to log any private user data.
199
199
4. See [Validate the applied app configuration policy].
0 commit comments