From 7148d8a78fbd4d02fe6687203705d576a44d9b31 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Tue, 15 Aug 2023 15:33:32 -0400 Subject: [PATCH] updates --- .../hello-for-business/hello-feature-pin-reset.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md b/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md index 87449de760..9f0e8d48ae 100644 --- a/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md +++ b/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md @@ -191,9 +191,9 @@ If you have a federated environment and authentication is handled using AD FS or Alternatively, you can configure devices using a [custom policy][INT-1] with the [Policy CSP][CSP-2]. -| OMA-URI |Data type| Value| -|-|-|-| -| `./Vendor/MSFT/Policy/Config/Authentication/ConfigureWebSignInAllowedUrls`| String |Provide a semicolon delimited list of domains needed for authentication during the PIN reset scenario. An example value would be **signin.contoso.com;portal.contoso.com**| +| Setting | +|--------| +|