This commit is contained in:
Paolo Matarazzo 2023-01-23 06:02:17 -05:00
parent 510419f1cb
commit 04b91cd348
2 changed files with 1 additions and 3 deletions

View File

@ -221,7 +221,7 @@ With the CA properly configured with a valid HTTP-based CRL distribution point,
## Deploy the root CA certificate to Azure AD-joined devices
The domain controllers have a certificate that includes the new CRL distribution point. Next, you need the enterprise root certificate so you can deploy it to Azure AD-joined devices. When you deploy the enterprise root certificates to a device, it ensures the device trusts any certificates issued by the certificate authority. Without the certificate, Azure AD-joined devices don't trust domain controller certificates and authentication fails. Expand each step to learn more:
The domain controllers have a certificate that includes the new CRL distribution point. Next, you need the enterprise root certificate so you can deploy it to Azure AD-joined devices. When you deploy the enterprise root certificates to a device, it ensures the device trusts any certificates issued by the certificate authority. Without the certificate, Azure AD-joined devices don't trust domain controller certificates and authentication fails.
### Export the enterprise root certificate

View File

@ -43,8 +43,6 @@ Sign in using *Enterprise Administrator* equivalent credentials on a Windows Ser
## Configure the enterprise PKI
The configuration of the enterprise PKI to support Windows Hello for Business consists of the following steps (expand each step to learn more):
[!INCLUDE [dc-certificate-template](includes/dc-certificate-template.md)]
> [!NOTE]