From 04b91cd348f718d6c2e5762fc380b0481640971c Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Mon, 23 Jan 2023 06:02:17 -0500 Subject: [PATCH] updates --- .../hello-for-business/hello-hybrid-aadj-sso.md | 2 +- .../hello-for-business/hello-hybrid-key-trust-validate-pki.md | 2 -- 2 files changed, 1 insertion(+), 3 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso.md index 772886ff7a..dc1a4ea488 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso.md @@ -221,7 +221,7 @@ With the CA properly configured with a valid HTTP-based CRL distribution point, ## Deploy the root CA certificate to Azure AD-joined devices -The domain controllers have a certificate that includes the new CRL distribution point. Next, you need the enterprise root certificate so you can deploy it to Azure AD-joined devices. When you deploy the enterprise root certificates to a device, it ensures the device trusts any certificates issued by the certificate authority. Without the certificate, Azure AD-joined devices don't trust domain controller certificates and authentication fails. Expand each step to learn more: +The domain controllers have a certificate that includes the new CRL distribution point. Next, you need the enterprise root certificate so you can deploy it to Azure AD-joined devices. When you deploy the enterprise root certificates to a device, it ensures the device trusts any certificates issued by the certificate authority. Without the certificate, Azure AD-joined devices don't trust domain controller certificates and authentication fails. ### Export the enterprise root certificate diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-validate-pki.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-validate-pki.md index fdba110791..19c9df7d89 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-validate-pki.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-validate-pki.md @@ -43,8 +43,6 @@ Sign in using *Enterprise Administrator* equivalent credentials on a Windows Ser ## Configure the enterprise PKI -The configuration of the enterprise PKI to support Windows Hello for Business consists of the following steps (expand each step to learn more): - [!INCLUDE [dc-certificate-template](includes/dc-certificate-template.md)] > [!NOTE]