mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-19 08:47:22 +00:00
Update windows/security/identity-protection/hello-for-business/hello-cert-trust-adfs.md
Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
This commit is contained in:
parent
3f52aca0f4
commit
2e58aa16fc
@ -44,7 +44,7 @@ Prepare the Active Directory Federation Services deployment by installing and up
|
|||||||
> 1. Launch AD FS management console. Brose to "Services > Scope Descriptions".
|
> 1. Launch AD FS management console. Brose to "Services > Scope Descriptions".
|
||||||
> 2. Right click "Scope Descriptions" and select "Add Scope Description".
|
> 2. Right click "Scope Descriptions" and select "Add Scope Description".
|
||||||
> 3. Under name type "ugs" and Click Apply > OK.
|
> 3. Under name type "ugs" and Click Apply > OK.
|
||||||
> 4. Launch Powershell as Administrator.
|
> 4. Launch PowerShell as an administrator.
|
||||||
> 5. Get the ObjectIdentifier of application permission with ClientRoleIdentifier parameter equal to "38aa3b87-a06d-4817-b275-7a316988d93b":
|
> 5. Get the ObjectIdentifier of application permission with ClientRoleIdentifier parameter equal to "38aa3b87-a06d-4817-b275-7a316988d93b":
|
||||||
```(Get-AdfsApplicationPermission -ServerRoleIdentifiers 'http://schemas.microsoft.com/ws/2009/12/identityserver/selfscope' | ?{ $_.ClientRoleIdentifier -eq '38aa3b87-a06d-4817-b275-7a316988d93b' }).ObjectIdentifier```
|
```(Get-AdfsApplicationPermission -ServerRoleIdentifiers 'http://schemas.microsoft.com/ws/2009/12/identityserver/selfscope' | ?{ $_.ClientRoleIdentifier -eq '38aa3b87-a06d-4817-b275-7a316988d93b' }).ObjectIdentifier```
|
||||||
> 6. Execute the command "Set-AdfsApplicationPermission -TargetIdentifier <ObjectIdentifier from step 5> -AddScope 'ugs'.
|
> 6. Execute the command "Set-AdfsApplicationPermission -TargetIdentifier <ObjectIdentifier from step 5> -AddScope 'ugs'.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user