diff --git a/windows/security/identity-protection/hello-for-business/rdp-sign-in.md b/windows/security/identity-protection/hello-for-business/rdp-sign-in.md index 526f227535..50a810b7bf 100644 --- a/windows/security/identity-protection/hello-for-business/rdp-sign-in.md +++ b/windows/security/identity-protection/hello-for-business/rdp-sign-in.md @@ -11,8 +11,8 @@ You can use Windows Hello for Business to sign in to a remote desktop session, u This article describes three certificate deployment approaches, where authentication certificates are deployed to the Windows Hello for Business container: -- Using an Active Directory Certificate Services (AD CS) enrollment policy - Using Microsoft Intune with SCEP or PKCS connectors +- Using an Active Directory Certificate Services (AD CS) enrollment policy - Using a third-party PKI > [!TIP] @@ -50,14 +50,14 @@ If you plan to deploy certificates using Microsoft Intune, here are additional r > * Ensure you have the infrastructure to support either [SCEP][MEM-1] or [PKCS][MEM-2] deployment > * Deploy the root CA certificate and any other intermediate certificate authority certificates to Microsoft Entra joined Devices using a [Trusted root certificate policy][MEM-5] -## Create a Windows Hello for Business certificate template +## Create a certificate template -This process is applicable to scenarios where you deploy certificates using an on-premises Active Directory Certificate Services infrastrusture, which include: +The process of creating a certificate template is applicable to scenarios where you use an on-premises Active Directory Certificate Services (AD CS) infrastrusture.\ +You must first create a certificate template, and then deploy certificates based on that template to the Windows Hello for Business container. -- Using an AD CS enrollment policy -- Using Microsoft Intune with SCEP or PKCS connectors +The certificate template configuration is different depending on whether you deploy certificates using Microsoft Intune or an AD CS enrollment policy. Select the option that best suits your needs. -You must first create a *certificate template*, and then deploy certificates based on that template to the Windows Hello for Business container. The following steps describe how to create a certificate template: +# [:::image type="icon" source="../../images/icons/intune.svg" border="false"::: **Microsoft Intune**](#tab/intune) 1. Sign in to your issuing certificate authority (CA) and open *Server Manager* 1. Select **Tools > Certification Authority**. The Certification Authority Microsoft Management Console (MMC) opens @@ -69,20 +69,40 @@ You must first create a *certificate template*, and then deploy certificates bas | Tab Name | Configurations | | --- | --- | | *Compatibility* | | - | *General* | | - | *Extensions* | Verify the **Application Policies** extension includes **Smart Card Logon**| - | *Subject Name* |
**Note:** If you deploy certificates via Intune, select **Supply in the request** instead of *Build from this Active Directory*.| - |*Request Handling*|
**Note:** If you deploy certificates via Intune with a PKCS profile, select the option **Allow private key to be exported**| + | *General* | | + | *Extensions* | Verify the **Application Policies** extension includes **Smart Card Logon**.| + | *Subject Name* | Select **Supply in the request**.| + |*Request Handling*|
**Note:** If you deploy certificates with a PKCS profile, select the option **Allow private key to be exported**| |*Cryptography*|