diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-validate-pki.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-validate-pki.md index a7201bc0f1..eeeb654fb8 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-validate-pki.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-validate-pki.md @@ -61,7 +61,6 @@ If you don't have an existing PKI, review [Certification Authority Guidance](/pr Expand the following sections to configure the PKI for Windows Hello for Business. -
Configure domain controller certificates @@ -103,9 +102,8 @@ Sign in to a CA or management workstations with *Domain Administrator* equivalen
-
-Supersede existing domain controller certificates +

Supersede existing domain controller certificates

The domain controllers may have an existing domain controller certificate. The Active Directory Certificate Services provides a default certificate template for domain controllers called *domain controller certificate*. Later releases of Windows Server provided a new certificate template called *domain controller authentication certificate*. These certificate templates were provided prior to the update of the Kerberos specification that stated Key Distribution Centers (KDCs) performing certificate authentication needed to include the *KDC Authentication* extension. @@ -134,7 +132,6 @@ The certificate template is configured to supersede all the certificate template
-
Unpublish Superseded Certificate Templates @@ -151,7 +148,6 @@ Sign in to the CA or management workstation with *Enterprise Administrator* equi
-
Publish certificate templates to the CA