Skip to content

Commit 7304365

Browse files
committed
Merge branch 'erikre-oob2208-15363982' of https://github.com/Erikre/memdocs-pr into erikre-oob2208-15363982
2 parents 2b3a120 + c30e2b6 commit 7304365

2 files changed

Lines changed: 8 additions & 8 deletions

File tree

memdocs/intune/developer/app-sdk-android-phase4.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -447,11 +447,11 @@ Execute the following test first to get familiar with the complete end user expe
447447
- > [!TIP]
448448
> Uninstalling other SDK-integrated apps helps ensure that you're exclusively testing your own app's integration.
449449
5. Install your application.
450-
6. Log into your application with your test account that is targeted with App Protection Policy.
450+
6. Log in to your application with your test account that is targeted with App Protection Policy.
451451
7. Confirm that you're prompted to install the Intune Company Portal from Google Play.
452452
- > [!NOTE]
453453
> If your test device does not have the Google Play Store app, confirm you are prompted to install the Intune Company Portal from either another app store or a Microsoft website.
454-
8. Install the Company Portal. You don't need to launch the Company Portal or log into the Company Portal.
454+
8. Install the Company Portal. You don't need to launch the Company Portal or log in to the Company Portal.
455455
9. Return to your app and log in again, if necessary.
456456
10. Confirm that you're prompted with a Get Access screen. This indicates that the SDK has successfully retrieved policy for this account.
457457
11. You should be prompted to set an app PIN. Create a PIN.
@@ -474,8 +474,8 @@ For these tests:
474474
2. Install the Intune Company Portal.
475475
3. Install another managed app, targeted with the same policy as your app, that can copy and paste data (like Microsoft Office).
476476
4. Install (or reuse) any unmanaged app that can copy and paste data.
477-
5. Log into your app with the test managed account.
478-
6. Log into the other managed app with the managed test account.
477+
5. Log in to your app with the test managed account.
478+
6. Log in to the other managed app with the managed test account.
479479

480480

481481
| Scenario | App Protection Policy Setting | Test Steps |
@@ -503,8 +503,8 @@ For these tests:
503503
2. Install the Intune Company Portal.
504504
3. Install another managed app, targeted with the same policy as your app, that can send and receive data (like Microsoft Outlook).
505505
4. Install (or reuse) any unmanaged app that can send and receive data.
506-
5. Log into your app with the test managed account.
507-
6. Log into the other managed app with the managed test account.
506+
5. Log in to your app with the test managed account.
507+
6. Log in to the other managed app with the managed test account.
508508

509509
| Scenario | App Protection Policy Setting | Test Steps |
510510
| - | - | - |

memdocs/intune/developer/app-sdk-android-phase6.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -189,11 +189,11 @@ To validate that Intune is properly delivering app configuration policy:
189189
- If your app supports app configuration for managed devices, see [application configuration policies for managed Android Enterprise devices].
190190
- If your app supports app configuration for managed apps, see [application configuration policies for managed apps].
191191
- If your app supports both types of app configuration, create both types of policy for testing.
192-
2. Log into your app with your test account.
192+
2. Log in to your app with your test account.
193193
- For managed devices, see [Android enterprise app configuration policies] and [Enroll Android devices].
194194
- For managed apps:
195195
1. Install both your app and the Intune Company Portal.
196-
2. Log into your app with your test account.
196+
2. Log in to your app with your test account.
197197
3. Navigate through your app to exercise each codepath that calls `MAMAppConfigManager`'s `getAppConfig` or `getFullData`.
198198
- Logging the results of calls to `getAppConfig` is a simple way to validate which settings are delivered. However, because administrators can enter any data for app configuration settings, be careful not to log any private user data.
199199
4. See [Validate the applied app configuration policy].

0 commit comments

Comments
 (0)