From 07097e3aec2eac426de200742ef5ac49db9d1df3 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Fri, 8 Dec 2023 15:11:31 -0500 Subject: [PATCH] Update certificate template instructions --- .../identity-protection/hello-for-business/rdp-sign-in.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/rdp-sign-in.md b/windows/security/identity-protection/hello-for-business/rdp-sign-in.md index 072119d7ce..17a307722c 100644 --- a/windows/security/identity-protection/hello-for-business/rdp-sign-in.md +++ b/windows/security/identity-protection/hello-for-business/rdp-sign-in.md @@ -73,8 +73,8 @@ You must first create a *certificate template*, and then deploy certificates bas | *Extensions* | Verify the **Application Policies** extension includes **Smart Card Logon**| | *Subject Name* |
**Note:** If you deploy certificates via Intune, select **Supply in the request** instead of *Build from this Active Directory*.| |*Request Handling*|
**Note:** If you deploy certificates via Intune with a PKCS profile, select the option **Allow private key to be exported**| - |*Cryptography*|
**Note:** If you deploy certificates via Intune with a PKCS profile, use the **Microsoft Software Key Storage Provider**| - |*Security*|Add the security group that you want to give **Enroll** access to. For example, if you want to give access to all users, select the **Authenticated** users group, and then select Enroll permissions for them.
**Note:** If you deploy certificates via Intune, grant **Enroll** access to the service principal used for SCEP or PKCS.| + |*Cryptography*|