mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-18 11:53:37 +00:00
updates
This commit is contained in:
@ -22,13 +22,14 @@ Education themes aren't enabled by default. Follow the instructions below to con
|
|||||||
|
|
||||||
#### [:::image type="icon" source="images/icons/intune.svg"::: **Intune**](#tab/intune)
|
#### [:::image type="icon" source="images/icons/intune.svg"::: **Intune**](#tab/intune)
|
||||||
|
|
||||||
To configure devices using Microsoft Intune, create a [custom policy][MEM-1] with the following settings:
|
[!INCLUDE [intune-custom-settings-1](includes/intune-custom-settings-1.md)]
|
||||||
|
|
||||||
| Setting |
|
| Setting |
|
||||||
|--------|
|
|--------|
|
||||||
| <li> OMA-URI: **`./Vendor/MSFT/Policy/Config/Education/EnableEduThemes`** </li><li>Data type: **Integer** </li><li>Value: **1**</li>|
|
| <li> OMA-URI: **`./Vendor/MSFT/Policy/Config/Education/EnableEduThemes`** </li><li>Data type: **Integer** </li><li>Value: **1**</li>|
|
||||||
|
|
||||||
Assign the policy to a security group that contains as members the devices or users that you want to configure.
|
[!INCLUDE [intune-custom-settings-2](includes/intune-custom-settings-2.md)]
|
||||||
|
[!INCLUDE [intune-custom-settings-info](includes/intune-custom-settings-info.md)]
|
||||||
|
|
||||||
#### [:::image type="icon" source="images/icons/provisioning-package.svg"::: **PPKG**](#tab/ppkg)
|
#### [:::image type="icon" source="images/icons/provisioning-package.svg"::: **PPKG**](#tab/ppkg)
|
||||||
|
|
||||||
|
@ -18,11 +18,11 @@ ms.technology: itpro-security
|
|||||||
---
|
---
|
||||||
# Hybrid cloud Kerberos trust deployment
|
# Hybrid cloud Kerberos trust deployment
|
||||||
|
|
||||||
✅ **Deployment type:** [hybrid](hello-how-it-works-technology#hybrid-deployment)\
|
✅ **Deployment type:** [hybrid](./hello-how-it-works-technology#hybrid-deployment)\
|
||||||
✅ **Trust type:** [key trust](hello-hybrid-key-trust)\
|
✅ **Trust type:** [key trust](./hello-hybrid-key-trust)\
|
||||||
✅ **Trust type:** [cloud Kerberos trust](hello-hybrid-cloud-kerberos-trust)\
|
✅ **Trust type:** [cloud Kerberos trust](./hello-hybrid-cloud-kerberos-trust)\
|
||||||
✅ **Trust type:** [certificate trust](hello-hybrid-cert-trust)\
|
✅ **Trust type:** [certificate trust](./hello-hybrid-cert-trust)\
|
||||||
✅ **Device registration type:** [Azure AD join](hello-how-it-works-technology#azure-active-directory-join), [Hybrid Azure AD join](hello-how-it-works-technology#hybrid-azure-ad-join)
|
✅ **Device registration type:** [Azure AD join](./hello-how-it-works-technology#azure-active-directory-join), [Hybrid Azure AD join](./hello-how-it-works-technology#hybrid-azure-ad-join)
|
||||||
|
|
||||||
Windows Hello for Business replaces password sign-in with strong authentication, using an asymmetric key pair. This deployment guide provides the information to successfully deploy Windows Hello for Business in a hybrid cloud Kerberos trust scenario.
|
Windows Hello for Business replaces password sign-in with strong authentication, using an asymmetric key pair. This deployment guide provides the information to successfully deploy Windows Hello for Business in a hybrid cloud Kerberos trust scenario.
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user