Skip to content

Commit a46447d

Browse files
author
Angela Fleischmann
authored
Update app-sdk-android-phase5.md
app-sdk-a...d-phase5.md https://microsoft-ce-csi.acrolinx.cloud/api/v1/checking/scorecards/715bc998-ae96-441a-95df-503954679a47#CORRECTNESS Line 348: a user select > a user selects Line 386: beahvior > behavior Lines 651-653: Login first > Log in first Line 652-653: Login > Log in Line 655: Logout > Log out Line 687: Log into the other > Log in to the other
1 parent f52a91d commit a46447d

1 file changed

Lines changed: 7 additions & 7 deletions

File tree

memdocs/intune/developer/app-sdk-android-phase5.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -345,7 +345,7 @@ The SDK will never change the active identity without providing these implicit i
345345
#### Sources of Implicit Identity Changes
346346
- Data ingress from **other Intune-managed apps** can change the active identity on the thread and context level.
347347
- If an activity is launched from an `Intent` sent by another MAM app, the activity's identity will be set based on the active identity in the other app at the point the `Intent` was sent.
348-
- For example, an activity to view a Word document is launched from an intent from Microsoft Outlook when a user select a document attachment. Office's document viewer activity's identity is switched to the identity from Outlook.
348+
- For example, an activity to view a Word document is launched from an intent from Microsoft Outlook when a user selects a document attachment. Office's document viewer activity's identity is switched to the identity from Outlook.
349349

350350
- For services, the thread identity will be set similarly for the duration of an `onStart` or `onBind` call. Calls into the `Binder` returned from `onBind` will also temporarily set the thread identity.
351351

@@ -383,7 +383,7 @@ The `AppIdentitySwitchReason` enum parameter describes the source of the implici
383383
| `NEW_INTENT` | Allow the identity switch. | The identity switch is occurring because a new intent is being assigned to an activity. |
384384
| `RESUME_CANCELLED` | Block the identity switch. | The identity switch is occurring because a resume was canceled. This is most common when the end user presses the back button on the PIN, authentication, or compliance UI. |
385385

386-
The [AppIdentitySwitchResultCallback] parameter allows developers to override the default beahvior for the identity switch:
386+
The [AppIdentitySwitchResultCallback] parameter allows developers to override the default behavior for the identity switch:
387387

388388
```java
389389
public interface AppIdentitySwitchResultCallback {
@@ -648,11 +648,11 @@ For these tests, install your app and the Intune Company Portal; don't log in be
648648
649649
| Scenario | Steps |
650650
| - | - |
651-
| Login managed first | - Login first with a managed account and validate that account's data are managed. <br> - Login with an unmanaged account and validate that account's data aren't managed. |
652-
| Login unmanaged first | - Login first with an unmanaged account and validate that account's data aren't managed. <br> - Login with a managed account and validate that account's data are managed. |
653-
| Login multiple managed | - Login first with a managed account and validate that account's data are managed. <br> - Login with a second managed account and validate that the user is blocked from logging in without first removing the original managed account. |
651+
| Login managed first | - Log in first with a managed account and validate that account's data are managed. <br> - Login with an unmanaged account and validate that account's data aren't managed. |
652+
| Log in unmanaged first | - Log in first with an unmanaged account and validate that account's data aren't managed. <br> - Login with a managed account and validate that account's data are managed. |
653+
| Log in multiple managed | - Log in first with a managed account and validate that account's data are managed. <br> - Login with a second managed account and validate that the user is blocked from logging in without first removing the original managed account. |
654654
| Logout managed | - Log in to your app with both a managed an unmanaged account. <br> - Log out of the managed account. <br> - Confirm that the managed account is removed from your app and all that account's data has been removed. <br> - Confirm that the unmanaged account is still logged in, none of the unmanaged account's data has been removed, and policy is still not applied. |
655-
| Logout unmanaged | - Log in to your app with both a managed an unmanaged account. <br> - Log out of the unmanaged account. <br> - Confirm that the unmanaged account is removed from your app and all that account's data has been removed. <br> - Confirm that the managed account is still logged in, none of the unmanaged account's data has been removed, and policy is still applied. |
655+
| Log out unmanaged | - Log in to your app with both a managed an unmanaged account. <br> - Log out of the unmanaged account. <br> - Confirm that the unmanaged account is removed from your app and all that account's data has been removed. <br> - Confirm that the managed account is still logged in, none of the unmanaged account's data has been removed, and policy is still applied. |
656656

657657
#### Validating active identity and app lifecycle
658658
Your multi-identity app may present views with a single account's data and allow the user to explicitly change the current in-use account.
@@ -684,7 +684,7 @@ For these tests, install your app and the Intune Company Portal; log in with bot
684684
- Install other apps on the test device:
685685
- A managed app, targeted with the same policy as your app, that can send and receive data (like Microsoft Outlook).
686686
- Any unmanaged app that can send and receive data.
687-
- Log into the other managed app with the managed test account. Even if the other managed app is multi-identity, only log in with the managed account.
687+
- Log in to the other managed app with the managed test account. Even if the other managed app is multi-identity, only log in with the managed account.
688688
689689
If your app has the ability to send data to other apps, like Microsoft Outlook sending a document attachment to Microsoft Office:
690690
| Scenario | Steps |

0 commit comments

Comments
 (0)