mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 06:17:22 +00:00
Merge pull request #9455 from MaratMussabekov/patch-277
added notes about OnPrem_Distinguished_Name
This commit is contained in:
commit
3a95b5868a
@ -679,6 +679,11 @@ Sign-in a workstation with access equivalent to a _domain user_.
|
|||||||
|
|
||||||
10. Select **Enroll to Windows Hello for Business, otherwise fail (Windows 10 and later)** from the **Key storage provider (KSP)** list.
|
10. Select **Enroll to Windows Hello for Business, otherwise fail (Windows 10 and later)** from the **Key storage provider (KSP)** list.
|
||||||
11. Next to **Subject name format**, type **CN={{OnPrem_Distinguished_Name}}** to make the on-premises distinguished name the subject of the issued certificate.
|
11. Next to **Subject name format**, type **CN={{OnPrem_Distinguished_Name}}** to make the on-premises distinguished name the subject of the issued certificate.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> If the distinguished name contains special characters like a plus sign ("+"), comma (","), semicolon (";"), or equal sign ("="), the bracketed name must be enclosed in quotation marks: CN=”{{OnPrem_Distinguished_Name}}”.
|
||||||
|
> If the length of the distinguished name is more than 64 characters, the name length enforcement on the Certification Authority [must be disabled](/previous-versions/windows/it-pro/windows-server-2003/cc784789(v=ws.10)?#disable-dn-length-enforcement).
|
||||||
|
|
||||||
12. Specify **User Principal Name (UPN)** as a **Subject Alternative Name** parameter. Set its value as {{UserPrincipalName}}.
|
12. Specify **User Principal Name (UPN)** as a **Subject Alternative Name** parameter. Set its value as {{UserPrincipalName}}.
|
||||||
13. Refer to the "Configure Certificate Templates on NDES" task for how you configured the **AADJ WHFB Authentication** certificate template in the registry. Select the appropriate combination of key usages from the **Key Usages** list that map to the configured NDES template in the registry. In this example, the **AADJ WHFB Authentication** certificate template was added to the **SignatureTemplate** registry value name. The **Key usage** that maps to that registry value name is **Digital Signature**.
|
13. Refer to the "Configure Certificate Templates on NDES" task for how you configured the **AADJ WHFB Authentication** certificate template in the registry. Select the appropriate combination of key usages from the **Key Usages** list that map to the configured NDES template in the registry. In this example, the **AADJ WHFB Authentication** certificate template was added to the **SignatureTemplate** registry value name. The **Key usage** that maps to that registry value name is **Digital Signature**.
|
||||||
14. Select a previously configured **Trusted certificate** profile that matches the root certificate of the issuing certificate authority as a root certificate for the profile.
|
14. Select a previously configured **Trusted certificate** profile that matches the root certificate of the issuing certificate authority as a root certificate for the profile.
|
||||||
@ -712,4 +717,4 @@ You have successfully completed the configuration. Add users that need to enrol
|
|||||||
> * Install and Configure the NDES Role
|
> * Install and Configure the NDES Role
|
||||||
> * Configure Network Device Enrollment Services to work with Microsoft Intune
|
> * Configure Network Device Enrollment Services to work with Microsoft Intune
|
||||||
> * Download, Install, and Configure the Intune Certificate Connector
|
> * Download, Install, and Configure the Intune Certificate Connector
|
||||||
> * Create and Assign a Simple Certificate Enrollment Protocol (SCEP Certificate Profile)
|
> * Create and Assign a Simple Certificate Enrollment Protocol (SCEP Certificate Profile)
|
||||||
|
Loading…
x
Reference in New Issue
Block a user