mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 13:57:22 +00:00
updates
This commit is contained in:
parent
510419f1cb
commit
04b91cd348
@ -221,7 +221,7 @@ With the CA properly configured with a valid HTTP-based CRL distribution point,
|
||||
|
||||
## Deploy the root CA certificate to Azure AD-joined devices
|
||||
|
||||
The domain controllers have a certificate that includes the new CRL distribution point. Next, you need the enterprise root certificate so you can deploy it to Azure AD-joined devices. When you deploy the enterprise root certificates to a device, it ensures the device trusts any certificates issued by the certificate authority. Without the certificate, Azure AD-joined devices don't trust domain controller certificates and authentication fails. Expand each step to learn more:
|
||||
The domain controllers have a certificate that includes the new CRL distribution point. Next, you need the enterprise root certificate so you can deploy it to Azure AD-joined devices. When you deploy the enterprise root certificates to a device, it ensures the device trusts any certificates issued by the certificate authority. Without the certificate, Azure AD-joined devices don't trust domain controller certificates and authentication fails.
|
||||
|
||||
### Export the enterprise root certificate
|
||||
|
||||
|
@ -43,8 +43,6 @@ Sign in using *Enterprise Administrator* equivalent credentials on a Windows Ser
|
||||
|
||||
## Configure the enterprise PKI
|
||||
|
||||
The configuration of the enterprise PKI to support Windows Hello for Business consists of the following steps (expand each step to learn more):
|
||||
|
||||
[!INCLUDE [dc-certificate-template](includes/dc-certificate-template.md)]
|
||||
|
||||
> [!NOTE]
|
||||
|
Loading…
x
Reference in New Issue
Block a user