Skip to content

Commit 95bc33b

Browse files
committed
Fixup MSDOCS rule issues from recent update.
1 parent f7e0402 commit 95bc33b

15 files changed

+311
-326
lines changed

docs/general-development/build-mobile-apps-for-other-platforms-using-sharepoint.md

Lines changed: 10 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -293,37 +293,14 @@ For more information, see [Complete basic operations using SharePoint REST endp
293293

294294

295295
## See also
296-
<a name="bk_addresources"> </a>
297-
298-
299-
- [Build Windows Phone apps that access SharePoint](build-windows-phone-apps-that-access-sharepoint.md)
300-
301-
302-
- [Using the SharePoint REST service](https://docs.microsoft.com/sharepoint/dev/sp-add-ins/get-to-know-the-sharepoint-rest-service)
303-
304-
305-
- [Build Windows Phone apps that access SharePoint](build-windows-phone-apps-that-access-sharepoint.md)
306-
307-
308-
- [Choose the right API set in SharePoint](choose-the-right-api-set-in-sharepoint.md)
309-
310-
311-
- [Use OData query operations in SharePoint REST requests](https://msdn.microsoft.com/library/d4b5c277-ed50-420c-8a9b-860342284b72%28Office.15%29.aspx)
312-
313-
314-
- [Get to know the SharePoint REST service](https://msdn.microsoft.com/library/2de035a0-ac75-43bd-9665-5c5a59c4c590%28Office.15%29.aspx)
315-
316-
317-
- [Open Data Protocol](http://www.odata.org/)
318-
319-
320-
- [Authorization and authentication of SharePoint Add-ins](https://msdn.microsoft.com/library/bde5647a-fff1-4b51-b67b-2139de79ce4a%28Office.15%29.aspx)
321-
322-
323-
- [Windows Phone SDK 8.0](https://www.microsoft.com/download/details.aspx?id=35471)
324-
325-
326-
- [Microsoft SharePoint SDK for Windows Phone 8](https://www.microsoft.com/download/details.aspx?id=36818)
327-
328-
329296

297+
- [Build Windows Phone apps that access SharePoint](build-windows-phone-apps-that-access-sharepoint.md)
298+
- [Get to know the SharePoint REST service](../sp-add-ins/get-to-know-the-sharepoint-rest-service.md)
299+
- [Build Windows Phone apps that access SharePoint](build-windows-phone-apps-that-access-sharepoint.md)
300+
- [Choose the right API set in SharePoint](choose-the-right-api-set-in-sharepoint.md)
301+
- [Use OData query operations in SharePoint REST requests](https://msdn.microsoft.com/library/d4b5c277-ed50-420c-8a9b-860342284b72%28Office.15%29.aspx)
302+
- [Get to know the SharePoint REST service](https://msdn.microsoft.com/library/2de035a0-ac75-43bd-9665-5c5a59c4c590%28Office.15%29.aspx)
303+
- [Open Data Protocol](http://www.odata.org/)
304+
- [Authorization and authentication of SharePoint Add-ins](https://msdn.microsoft.com/library/bde5647a-fff1-4b51-b67b-2139de79ce4a%28Office.15%29.aspx)
305+
- [Windows Phone SDK 8.0](https://www.microsoft.com/download/details.aspx?id=35471)
306+
- [Microsoft SharePoint SDK for Windows Phone 8](https://www.microsoft.com/download/details.aspx?id=36818)

docs/general-development/how-to-retrieve-user-profile-properties-by-using-the-net-client-object-model-in.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
title: Retrieve user profile properties by using the .NET client object model in SharePoint
3+
description: Learn how to retrieve user profile properties programmatically by using the SharePoint .NET client object model.
34
ms.date: 09/25/2017
45
ms.prod: sharepoint
56
ms.assetid: 236ebaf8-f92e-4192-9b51-0a9de0210885
Lines changed: 121 additions & 120 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
title: Role, inheritance, elevation of privilege, and password changes in SharePoint
3+
description: "A role consists of two parts: a role definition and a role assignment."
34
ms.date: 09/25/2017
45
ms.prod: sharepoint
56
localization_priority: Normal
@@ -11,99 +12,99 @@ localization_priority: Normal
1112
## Roles, role definitions, and role assignments
1213
<a name="SP15_RoleInheritance_Role"> </a>
1314

14-
A role consists of two parts: a role definition and a role assignment.
15-
16-
17-
18-
The role definition, or permission level, is the list of rights associated with the role. A right is a uniquely controllable action within a SharePoint website. For example, a user with the **Read** role can browse pages in the website and view items in lists. User permissions are never managed directly by using rights. All user and group permissions are managed through roles. A role definition is a collection of rights bound to a specific object. Role definitions (for example, **Full Control**, **Read**, **Contribute**, **Design**, or **Limited Access**) are scoped to the website and mean the same thing everywhere within the website, but their meanings can differ between sites within the same site collection. Role definitions can also be inherited from the parent website, just as permissions can be inherited.
19-
20-
21-
15+
A role consists of two parts: a role definition and a role assignment.
16+
17+
18+
19+
The role definition, or permission level, is the list of rights associated with the role. A right is a uniquely controllable action within a SharePoint website. For example, a user with the **Read** role can browse pages in the website and view items in lists. User permissions are never managed directly by using rights. All user and group permissions are managed through roles. A role definition is a collection of rights bound to a specific object. Role definitions (for example, **Full Control**, **Read**, **Contribute**, **Design**, or **Limited Access**) are scoped to the website and mean the same thing everywhere within the website, but their meanings can differ between sites within the same site collection. Role definitions can also be inherited from the parent website, just as permissions can be inherited.
20+
21+
22+
2223
The role assignment is the relationship among the role definition, the users and groups, and the scope (for example, one user may be a reader on list 1, while another user is a reader on list 2). The relationship expressed through the role assignment is the key to making SharePoint security management role-based. All permissions are managed through roles; you never assign rights directly to a user. You assign only meaningful collections of rights (role definitions) that are well-defined and consistent. You manage unique permissions by adding or removing users and groups to or from role definitions through role assignments.
23-
24-
25-
24+
25+
26+
2627
The website administrator can customize the default role definitions and create additional custom roles by using the Manage Roles page, which lists the available role definitions in the site.
27-
28-
29-
28+
29+
30+
3031

3132
## Role definition inheritance
3233
<a name="SP15_RoleInheritance_RoleDefInheritance"> </a>
3334

3435
SharePoint supports inheriting role definitions similarly to how it supports inheriting permissions, and breaking role definition inheritance requires also breaking permissions inheritance.
35-
36-
37-
36+
37+
38+
3839
Each SharePoint object can have its own set of permissions or inherit its permissions from its parent container. SharePoint does not support partial inheritance, where an object would inherit all the permissions of its parent and also have some of its own permissions. Permissions are either unique or inherited. SharePoint does not support directed inheritance. For example, an object can inherit only from its parent container, not from some other object or container.
39-
40-
41-
40+
41+
42+
4243
When a website inherits role definitions, the roles are read-only, like the read-only permissions in an inherited website. The user can navigate to the parent site that holds the unique role definitions via a link. The default setting for all new websites, even sites with unique permissions, is to inherit role definitions from the parent website. When the permissions are unique, role definitions can be reverted to inherited role definitions or edited as local role definitions.
43-
44-
45-
44+
45+
46+
4647
Role definition inheritance in a website affects permissions inheritance following these rules:
47-
48-
49-
48+
49+
50+
5051

5152
- Cannot inherit permissions unless it also inherits role definitions.
52-
53-
53+
54+
5455
- Cannot create unique role definitions unless it also creates unique permissions.
55-
56-
56+
57+
5758
- Cannot revert to inherited role definitions unless it also reverts all unique permissions within the website. The existing permissions are dependent on the role definitions.
58-
59-
59+
60+
6061
- Cannot revert to inherited permissions unless it also reverts to inherited role definitions. The permissions for a website are always tied to the role definitions for that website.
61-
62-
62+
63+
6364

6465
## Managing user tokens
6566
<a name="SP15_RoleInheritance_ManagingUserTokens"> </a>
6667

67-
SharePoint fetches user token information from the SharePoint database. If the user has never visited the site or if the user's token was generated more than 24 hours previously, SharePoint generates a new user token by trying to refresh the list of groups that the user belongs to.
68-
69-
70-
68+
SharePoint fetches user token information from the SharePoint database. If the user has never visited the site or if the user's token was generated more than 24 hours previously, SharePoint generates a new user token by trying to refresh the list of groups that the user belongs to.
69+
70+
71+
7172
If the user account is an NT account, SharePoint uses the **AuthZ** interface to query the Active Directory directory service for the **TokenGroups** property. This may fail if SharePoint is running in an extranet mode, and does not have permission to query Active Directory for this property.
72-
73-
74-
73+
74+
75+
7576
If the user account is a membership user, SharePoint queries the ASP.NET **RoleManager** for all the roles that the user belongs to. This may fail if there is not a proper .config file for the current executable file.
76-
77-
78-
77+
78+
79+
7980
If SharePoint can't obtain the user's group memberships from Active Directory or **<roleManager>**, the newly generated token contains only the user's unique security ID (SID). No exception is thrown, but an entry is written into the ULS server log. The new token is also written into the SharePoint database so that it will not be regenerated within 24 hours.
80-
81-
82-
81+
82+
83+
8384
After SharePoint obtains a fresh token, from the SharePoint database or by generating a new token, SharePoint sets the timestamp to be the current time and then returns it to the caller. This guarantees that the token is fresh for 24 hours.
84-
85-
86-
85+
86+
87+
8788
After the [SPUserToken](https://msdn.microsoft.com/library/Microsoft.SharePoint.SPUserToken.aspx) object is returned to the caller, it is the caller's responsibility to not use the token after it is expired. You can write a helper utility to track the token expiration by recording the time when you get the token, and compare the diff with current time against [SPWebService.TokenTimeout](https://msdn.microsoft.com/library/Microsoft.SharePoint.Administration.SPWebService.TokenTimeout.aspx) .
88-
89-
90-
89+
90+
91+
9192
If an expired token is used to create a SharePoint website, an exception is thrown. The default token timeout value is 24 hours. It can be accessed via [SPWebService.TokenTimeout](https://msdn.microsoft.com/library/Microsoft.SharePoint.Administration.SPWebService.TokenTimeout.aspx) .
92-
93-
94-
93+
94+
95+
9596

9697
## Elevation of privilege
9798
<a name="SP15_RoleInheritance_ElevationOfPrivilege"> </a>
9899

99100
Elevation of privilege, a feature that was added in Windows SharePoint Services 3.0, enables you to programmatically perform actions in code by using an increased level of privilege. The [SPSecurity.RunWithElevatedPrivileges](https://msdn.microsoft.com/library/Microsoft.SharePoint.SPSecurity.RunWithElevatedPrivileges.aspx) method enables you to supply a delegate that runs a subset of code in the context of an account with higher privileges than the current user.
100-
101-
102-
101+
102+
103+
103104
The following is a standard use of **RunWithElevatedPrivileges**.
104-
105-
106-
105+
106+
107+
107108

108109

109110

@@ -116,9 +117,9 @@ SPSecurity.RunWithElevatedPrivileges(delegate()
116117
```
117118

118119
Frequently, to perform actions in SharePoint, you must get a new [SPSite](https://msdn.microsoft.com/library/Microsoft.SharePoint.SPSite.aspx) object to effect the changes. For example:
119-
120-
121-
120+
121+
122+
122123

123124

124125

@@ -134,100 +135,100 @@ SPSecurity.RunWithElevatedPrivileges(delegate()
134135
```
135136

136137
Although elevation of privilege provides a powerful technique for managing security, it should be used with care. You should not expose direct, uncontrolled mechanisms for people with low privileges to circumvent the permissions granted to them.
137-
138-
139-
138+
139+
140+
140141

141142
> **Important:**
142143
> If the method passed to [RunWithElevatedPrivileges](https://msdn.microsoft.com/library/Microsoft.SharePoint.SPSecurity.RunWithElevatedPrivileges.aspx) includes any write operations, the call to [RunWithElevatedPrivileges](https://msdn.microsoft.com/library/Microsoft.SharePoint.SPSecurity.RunWithElevatedPrivileges.aspx) should be preceded by a call to either [SPUtility.ValidateFormDigest()](https://msdn.microsoft.com/library/Microsoft.SharePoint.Utilities.SPUtility.ValidateFormDigest.aspx) or [SPWeb.ValidateFormDigest()](https://msdn.microsoft.com/library/Microsoft.SharePoint.SPWeb.ValidateFormDigest.aspx) .
143-
144-
145-
144+
145+
146+
146147

147148

148149
## Automatic password changes
149150
<a name="SP15_RoleInheritance_AutomaticPasswordChange"> </a>
150151

151152
The automatic password change feature enables you to update and deploy passwords without performing manual password update tasks across multiple accounts, services, and web applications. This makes managing password in SharePoint simpler. You can use the automatic password change feature to determine whether a password is about to expire and to reset the password by using a long, cryptographically strong random string.
152-
153-
154-
153+
154+
155+
155156

156157
### Managed account
157158

158159
You use managed accounts to implement the automatic password change feature. Managed accounts improve security and ensure application isolation. With managed accounts, you can:
159-
160-
161-
160+
161+
162+
162163

163164
- Configure the automatic password change feature to deploy passwords across all services in a farm.
164-
165-
165+
166+
166167
- Configure SharePoint web applications and services, that are running on application servers in a SharePoint farm, to use different ___domain accounts.
167-
168-
168+
169+
169170
- Map managed accounts to various services and web applications in a farm.
170-
171-
171+
172+
172173
- Create multiple accounts in Active Directory Domain Services (AD DS), and then register each of these accounts in SharePoint.
173-
174-
174+
175+
175176
You can also register managed accounts and enable SharePoint to control account passwords. Users have to be notified about planned password changes and related service interruptions, but the accounts used by a SharePoint farm, web applications, and various services can be automatically reset and deployed within the farm as necessary, based on individually configured password reset schedules.
176-
177-
178-
177+
178+
179+
179180
Operations that you can use the [SPManagedAccount](https://msdn.microsoft.com/library/Microsoft.SharePoint.Administration.SPManagedAccount.aspx) class to perform include:
180-
181-
182-
181+
182+
183+
183184

184185
- Change password
185-
186-
186+
187+
187188
- Set a password change schedule
188-
189-
189+
190+
190191
- Propagate password change
191-
192-
192+
193+
193194
- Find out when a password was last changed
194-
195-
195+
196+
196197
- Enforce minimum length for password
197-
198-
198+
199+
199200
For more information about the managed account API, see the following links:
200-
201-
202-
201+
202+
203+
203204

204205
- [SPManagedAccount](https://msdn.microsoft.com/library/Microsoft.SharePoint.Administration.SPManagedAccount.aspx)
205-
206-
206+
207+
207208
- [SPManagedAccount.EventProcessingOptions](https://msdn.microsoft.com/library/Microsoft.SharePoint.Administration.SPManagedAccount.EventProcessingOptions.aspx)
208-
209-
209+
210+
210211
- [SPManagedAccount.EventType](https://msdn.microsoft.com/library/Microsoft.SharePoint.Administration.SPManagedAccount.EventType.aspx)
211-
212-
212+
213+
213214

214215
## See also
215216
<a name="SP15_RoleInheritance_AdditionalResources"> </a>
216217

217218

218219
- [Authentication, authorization, and security in SharePoint](authentication-authorization-and-security-in-sharepoint.md)
219-
220-
220+
221+
221222
- [Authorization, users, groups, and the object model in SharePoint](authorization-users-groups-and-the-object-model-in-sharepoint.md)
222-
223-
223+
224+
224225
- [Claims-based identity in SharePoint](claims-based-identity-in-sharepoint.md)
225-
226-
226+
227+
227228
- [Claims-based identity and concepts in SharePoint](claims-based-identity-and-concepts-in-sharepoint.md)
228-
229-
229+
230+
230231
- [Configuration, administration, and resources in SharePoint](configuration-administration-and-resources-in-sharepoint.md)
231-
232-
232+
233+
233234

0 commit comments

Comments
 (0)