Skip to content

Commit 7a05d11

Browse files
committed
remove-last-xamarin-refs
1 parent f4c4d9f commit 7a05d11

8 files changed

Lines changed: 3 additions & 27 deletions

File tree

SECURITY.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
## Security
44

5-
Microsoft takes the security of our software products and services seriously, which includes all source code repositories managed through our GitHub organizations, which include [Microsoft](https://github.com/microsoft), [Azure](https://github.com/Azure), [DotNet](https://github.com/dotnet), [AspNet](https://github.com/aspnet), [Xamarin](https://github.com/xamarin), and [our GitHub organizations](https://opensource.microsoft.com/).
5+
Microsoft takes the security of our software products and services seriously, which includes all source code repositories managed through our GitHub organizations, which include [Microsoft](https://github.com/microsoft), [Azure](https://github.com/Azure), [DotNet](https://github.com/dotnet), [AspNet](https://github.com/aspnet) and [our GitHub organizations](https://opensource.microsoft.com/).
66

77
If you believe you have found a security vulnerability in any Microsoft-owned repository that meets [Microsoft's definition of a security vulnerability](https://aka.ms/opensource/security/definition), please report it to us as described below.
88

msal-dotnet-articles/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,8 +27,6 @@
2727
href: acquiring-tokens/desktop-mobile/acquiring-tokens-interactively.md
2828
- name: Using MSAL.NET with Web Account Manager (WAM)
2929
href: acquiring-tokens/desktop-mobile/wam.md
30-
- name: Xamarin
31-
href: acquiring-tokens/desktop-mobile/mobile-applications.md
3230
- name: Sign-in users with social identities
3331
href: acquiring-tokens/desktop-mobile/social-identities.md
3432
- name: Integrated Windows Authentication for domain or Microsoft Entra joined machines

msal-dotnet-articles/acquiring-tokens/desktop-mobile/acquiring-tokens-interactively.md

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -190,13 +190,6 @@ AcquireTokenSilent(scopesForVendorApi, accounts.FirstOrDefault()).ExecuteAsync()
190190

191191
For Microsoft personal accounts, re-prompting for consent on each native client call to authorize is the intended behavior. Native client identity is inherently insecure and the Microsoft identity platform chose to mitigate this for consumer services by prompting for consent each time the application is authorized.
192192

193-
## Platform-specific details
194-
195-
Depending on the platform, additional configuration might be required for interactive prompts:
196-
197-
- [Configuration requirements and troubleshooting tips for Xamarin Android with MSAL.NET](/entra/identity-platform/msal-net-xamarin-android-considerations)
198-
- [Considerations for using Xamarin iOS with MSAL.NET](/entra/identity-platform/msal-net-xamarin-ios-considerations)
199-
200193
## Samples
201194

202195
| Sample | Platform | Description |

msal-dotnet-articles/acquiring-tokens/desktop-mobile/mobile-applications.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,6 @@ MSAL.NET can be used with authentication brokers on mobile devices, such as Micr
1919
To get started with MSAL.NET integration on Android, refer to the following resources:
2020

2121
- [How to migrate Xamarin ADAL apps to MSAL for Android](/entra/identity-platform/msal-net-migration-android-broker)
22-
- [Xamarin Android Configuration Tips + Troubleshooting](/entra/identity-platform/msal-net-xamarin-android-considerations)
23-
- [Xamarin Android System Browser Info](/entra/identity-platform/msal-net-system-browser-android-considerations)
2422

2523
To learn more about testing MSAL on Android devices, refer to the [MSAL for Android Wiki](https://github.com/AzureAD/microsoft-authentication-library-for-android/wiki/Android-Emulator-with-MSAL).
2624

msal-dotnet-articles/advanced/httpclient.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -57,11 +57,6 @@ public class StaticClientWithProxyFactory : IMsalHttpClientFactory
5757
}
5858
```
5959

60-
61-
## HttpClient and Xamarin iOS
62-
63-
When using Xamarin iOS, it is recommended to create an `HttpClient` that explicitly uses the `NSURLSession`-based handler for iOS 7 and newer. MSAL.NET automatically creates an `HttpClient` that uses `NSURLSessionHandler` for iOS 7 and newer. For more information, read the [Xamarin iOS documentation for HttpClient](/xamarin/cross-platform/macios/http-stack).
64-
6560
## Troubleshooting
6661

6762
**Problem**: On a desktop application, the authorization experience do not use the HttpClient I defined

msal-dotnet-articles/advanced/testing-apps-using-msal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ Daemon apps use pre-deployed secrets (passwords or certificates) to talk to Micr
4848
For native clients, there are several approaches to testing:
4949

5050
- Use the [Username / Password](../acquiring-tokens/desktop-mobile/username-password-authentication.md) grant to fetch a token in a non-interactive way. This flow is not recommended in production, but it is reasonable to use it for testing.
51-
- Use a framework, like Appium or Xamarin.Test, that provides an automation interface for both your app and the MSAL created browser.
51+
- Use a framework, like Appium, that provides an automation interface for both your app and the MSAL created browser.
5252
- MSAL exposes an extensibility point that allows developers to inject their own browser experience. The MSAL team uses this internally to test interactive auth scenarios.
5353

5454
## Library feedback

msal-dotnet-articles/getting-started/initializing-client-applications.md

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -94,14 +94,6 @@ In the code snippets using application builders, many `.With` methods can be app
9494

9595
The modifiers you can set on a public client or confidential client application builder can be found in the `AbstractApplicationBuilder<T>` class. The different methods can be found in the [Azure SDK for .NET documentation](/dotnet/api/microsoft.identity.client.abstractapplicationbuilder-1).
9696

97-
### Modifiers specific to Xamarin.iOS applications
98-
99-
The modifiers you can set on a public client application builder on Xamarin.iOS are:
100-
101-
|Modifier | Description|
102-
|--------- | --------- |
103-
|`.WithIosKeychainSecurityGroup()` | **Xamarin.iOS only**: Sets the iOS key chain security group (for the cache persistence).|
104-
10597
### Modifiers specific to confidential client applications
10698

10799
The modifiers specific to a confidential client application builder can be found in the `ConfidentialClientApplicationBuilder` class. The different methods can be found in the [Azure SDK for .NET documentation](/dotnet/api/microsoft.identity.client.confidentialclientapplicationbuilder).

msal-dotnet-articles/getting-started/scenarios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ To enable this interaction, MSAL.NET leverages a [web browser](/azure/active-dir
5454

5555
#### Protecting the app itself with Intune
5656

57-
Your mobile app (written in Xamarin.iOS or Xamarin.Android) can have app protection policies applied to it, so that it can be [managed by InTune](/mem/intune/developer/app-sdk) and recognized by Intune as a managed app. The [InTune SDK](/mem/intune/developer/app-sdk-get-started) is separate from MSAL, and it talks to Microsoft Entra ID on its own.
57+
Your mobile app can have app protection policies applied to it, so that it can be [managed by InTune](/mem/intune/developer/app-sdk) and recognized by Intune as a managed app. The [InTune SDK](/mem/intune/developer/app-sdk-get-started) is separate from MSAL, and it talks to Microsoft Entra ID on its own.
5858

5959
### Desktop or service daemon app that calls a web API as itself (in its own name)
6060

0 commit comments

Comments
 (0)