From 5d00c8deae0bbca9f2a4ed5a7d36ec94021bff79 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Wed, 16 Nov 2022 07:55:38 -0500 Subject: [PATCH] updates --- .../hello-for-business/hello-deployment-rdp-certs.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-deployment-rdp-certs.md b/windows/security/identity-protection/hello-for-business/hello-deployment-rdp-certs.md index a493995334..49c542d7ef 100644 --- a/windows/security/identity-protection/hello-for-business/hello-deployment-rdp-certs.md +++ b/windows/security/identity-protection/hello-for-business/hello-deployment-rdp-certs.md @@ -58,12 +58,12 @@ Follow these steps to create a certificate template: | Tab Name | Configurations | | --- | --- | - | *Compatibility* | | - | *General* | | + | *Compatibility* |
  • Clear the **Show resulting changes** check box
  • Select **Windows Server 2012 or Windows Server 2012 R2** from the *Certification Authority list*
  • Select **Windows Server 2012 or Windows Server 2012 R2** from the *Certification Recipient list*
  • | + | *General* |
  • Specify a Template display name, for example *WHfB Certificate Authentication*
  • Set the validity period to the desired value
  • Take note of the Template name for later, which should be the same as the Template display name minus spaces (*WHfBCertificateAuthentication* in this example)
  • | | *Extensions* | Verify the **Application Policies** extension includes **Smart Card Logon**| - | *Subject Name* | | - |*Request Handling*|| - |*Cryptography*|| + | *Subject Name* |
  • Select the **Build from this Active Directory** information button if it is not already selected
  • Select **Fully distinguished name** from the **Subject name format** list if Fully distinguished name is not already selected
  • Select the **User Principal Name (UPN)** check box under **Include this information in alternative subject name**
  • | + |*Request Handling*|
  • Set the Purpose to **Signature and smartcard logon** and select **Yes** when prompted to change the certificate purpose
  • Select the **Renew with same key** check box
  • Select **Prompt the user during enrollment**
  • | + |*Cryptography*|
  • Set the Provider Category to **Key Storage Provider**
  • Set the Algorithm name to **RSA**
  • Set the minimum key size to **2048**
  • Select **Requests must use one of the following providers**
  • Select **Microsoft Software Key Storage Provider**
  • Set the Request hash to **SHA256**
  • | |*Security*|Add the security group that you want to give **Enroll** access to. For example, if you want to give access to all users, select the **Authenticated** users group, and then select Enroll permissions for them| 1. Select **OK** to finalize your changes and create the new template. Your new template should now appear in the list of Certificate Templates