mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-25 03:37:23 +00:00
fixed some more typos in hello-hybrid-aadj-sso-base.md
This commit is contained in:
parent
d9c36c938b
commit
5e62773285
@ -43,7 +43,7 @@ You can use the **dsregcmd.exe** command to determine if your device is register
|
|||||||
|
|
||||||
### CRL Distribution Point (CDP)
|
### CRL Distribution Point (CDP)
|
||||||
|
|
||||||
Certificates issued by a certificate authority can be revoked. When a certificate authority revokes as certificate, it writes information about the certificate into a revocation list. During certificate validation, Windows 10 consults the CRL distribution point within the certificate to get a list of revoked certificates. Certificate validates compares the current certificate with information in the certificate revocation list to determine if the certificate remains valid.
|
Certificates issued by a certificate authority can be revoked. When a certificate authority revokes as certificate, it writes information about the certificate into a revocation list. During certificate validation, Windows 10 consults the CRL distribution point within the certificate to get a list of revoked certificates. Validation compares the current certificate with information in the certificate revocation list to determine if the certificate remains valid.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -54,9 +54,9 @@ To resolve this issue, the CRL distribution point must be a location that is acc
|
|||||||
If your CRL distribution point does not list an HTTP distribution point, then you need to reconfigure the issuing certificate authority to include an HTTP CRL distribution point, preferably first in the list of distribution points.
|
If your CRL distribution point does not list an HTTP distribution point, then you need to reconfigure the issuing certificate authority to include an HTTP CRL distribution point, preferably first in the list of distribution points.
|
||||||
|
|
||||||
### Windows Server 2016 Domain Controllers
|
### Windows Server 2016 Domain Controllers
|
||||||
If you are interested in configuring your environment to use the Windows Hello for Business key rather than a certificate, then your environment must have an adequate number of Windows Server 2016 domain controllers. Only Windows Server 2016 domain controllers are capable of authenticating user with a Windows Hello for Business key. What do we mean by adequate? We are glad you asked. Read the [Planning an adequate number of Windows Server 2016 Domain Controllers for Windows Hello for Business deployments](hello-adequate-domain-controllers.md) to learn more.
|
If you are interested in configuring your environment to use the Windows Hello for Business key rather than a certificate, then your environment must have an adequate number of Windows Server 2016 domain controllers. Only Windows Server 2016 domain controllers are capable of authenticating user with a Windows Hello for Business key. What do we mean by adequate? We are glad you asked. Read [Planning an adequate number of Windows Server 2016 Domain Controllers for Windows Hello for Business deployments](hello-adequate-domain-controllers.md) to learn more.
|
||||||
|
|
||||||
If you are interested in configuring your environment to use the Windows Hello for Business certificate rather than key, then you are the right place. The same certificate configuration on the domain controllers is need regardless if you are using Windows Server 2016 domain controllers or domain controllers running earlier versions of Windows Server. You can simply ignore the Windows Server 2016 domain controller requirement.
|
If you are interested in configuring your environment to use the Windows Hello for Business certificate rather than key, then you are the right place. The same certificate configuration on the domain controllers is needed, whether you are using Windows Server 2016 domain controllers or domain controllers running earlier versions of Windows Server. You can simply ignore the Windows Server 2016 domain controller requirement.
|
||||||
|
|
||||||
### Domain Controller Certificates
|
### Domain Controller Certificates
|
||||||
|
|
||||||
@ -67,7 +67,7 @@ Certificate authorities write CRL distribution points in certificates as they ar
|
|||||||
Windows Hello for Business enforces the strict KDC validation security feature, which enforces a more restrictive criteria that must be met by the Key Distribution Center (KDC). When authenticating using Windows Hello for Business, the Windows 10 client validates the reply from the domain controller by ensuring all of the following are met:
|
Windows Hello for Business enforces the strict KDC validation security feature, which enforces a more restrictive criteria that must be met by the Key Distribution Center (KDC). When authenticating using Windows Hello for Business, the Windows 10 client validates the reply from the domain controller by ensuring all of the following are met:
|
||||||
|
|
||||||
- The domain controller has the private key for the certificate provided.
|
- The domain controller has the private key for the certificate provided.
|
||||||
- The root CA that issued the domain controller's certificate is in the device's **Trusted Root Certificate Authorties**.
|
- The root CA that issued the domain controller's certificate is in the device's **Trusted Root Certificate Authorities**.
|
||||||
- The domain controller's certificate has the **KDC Authentication** enhanced key usage.
|
- The domain controller's certificate has the **KDC Authentication** enhanced key usage.
|
||||||
- The domain controller's certificate's subject alternate name has a DNS Name that matches the name of the domain.
|
- The domain controller's certificate's subject alternate name has a DNS Name that matches the name of the domain.
|
||||||
|
|
||||||
@ -290,7 +290,7 @@ Sign-in a workstation with access equivalent to a _domain user_.
|
|||||||
6. Under **Priority**, click **Default**.
|
6. Under **Priority**, click **Default**.
|
||||||
7. Under **All users and all devices**, click **Settings**.
|
7. Under **All users and all devices**, click **Settings**.
|
||||||
8. Select **Enabled** from the **Configure Windows Hello for Business** list.
|
8. Select **Enabled** from the **Configure Windows Hello for Business** list.
|
||||||
9. Select **Required** next to **Use a Trusted Platform Module (TPM). By default, Windows Hello for Business prefers TPM 2.0 or falls backs to software. Choosing **Required** forces Windows Hello for Business to only use TPM 2.0 or TPM 1.2 and does not allow fall back to software based keys.
|
9. Select **Required** next to **Use a Trusted Platform Module (TPM)**. By default, Windows Hello for Business prefers TPM 2.0 or falls backs to software. Choosing **Required** forces Windows Hello for Business to only use TPM 2.0 or TPM 1.2 and does not allow fall back to software based keys.
|
||||||
10. Type the desired **Minimum PIN length** and **Maximum PIN length**.
|
10. Type the desired **Minimum PIN length** and **Maximum PIN length**.
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> The default minimum PIN length for Windows Hello for Business on Windows 10 is 6. Microsoft Intune defaults the minimum PIN length to 4, which reduces the security of the user's PIN. If you do not have a desired PIN length, set the minimum PIN length to 6.
|
> The default minimum PIN length for Windows Hello for Business on Windows 10 is 6. Microsoft Intune defaults the minimum PIN length to 4, which reduces the security of the user's PIN. If you do not have a desired PIN length, set the minimum PIN length to 6.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user