From 73328939e6610ac725aba889dc204d6585e7416c Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Sun, 10 Dec 2023 09:48:00 -0500 Subject: [PATCH] Fix bug in login functionality --- .../hello-for-business/rdp-sign-in.md | 96 +++--- .../hello-for-business/rdp-sign-in2.md | 274 ------------------ 2 files changed, 60 insertions(+), 310 deletions(-) delete mode 100644 windows/security/identity-protection/hello-for-business/rdp-sign-in2.md diff --git a/windows/security/identity-protection/hello-for-business/rdp-sign-in.md b/windows/security/identity-protection/hello-for-business/rdp-sign-in.md index 526f227535..50a810b7bf 100644 --- a/windows/security/identity-protection/hello-for-business/rdp-sign-in.md +++ b/windows/security/identity-protection/hello-for-business/rdp-sign-in.md @@ -11,8 +11,8 @@ You can use Windows Hello for Business to sign in to a remote desktop session, u This article describes three certificate deployment approaches, where authentication certificates are deployed to the Windows Hello for Business container: -- Using an Active Directory Certificate Services (AD CS) enrollment policy - Using Microsoft Intune with SCEP or PKCS connectors +- Using an Active Directory Certificate Services (AD CS) enrollment policy - Using a third-party PKI > [!TIP] @@ -50,14 +50,14 @@ If you plan to deploy certificates using Microsoft Intune, here are additional r > * Ensure you have the infrastructure to support either [SCEP][MEM-1] or [PKCS][MEM-2] deployment > * Deploy the root CA certificate and any other intermediate certificate authority certificates to Microsoft Entra joined Devices using a [Trusted root certificate policy][MEM-5] -## Create a Windows Hello for Business certificate template +## Create a certificate template -This process is applicable to scenarios where you deploy certificates using an on-premises Active Directory Certificate Services infrastrusture, which include: +The process of creating a certificate template is applicable to scenarios where you use an on-premises Active Directory Certificate Services (AD CS) infrastrusture.\ +You must first create a certificate template, and then deploy certificates based on that template to the Windows Hello for Business container. -- Using an AD CS enrollment policy -- Using Microsoft Intune with SCEP or PKCS connectors +The certificate template configuration is different depending on whether you deploy certificates using Microsoft Intune or an AD CS enrollment policy. Select the option that best suits your needs. -You must first create a *certificate template*, and then deploy certificates based on that template to the Windows Hello for Business container. The following steps describe how to create a certificate template: +# [:::image type="icon" source="../../images/icons/intune.svg" border="false"::: **Microsoft Intune**](#tab/intune) 1. Sign in to your issuing certificate authority (CA) and open *Server Manager* 1. Select **Tools > Certification Authority**. The Certification Authority Microsoft Management Console (MMC) opens @@ -69,20 +69,40 @@ You must first create a *certificate template*, and then deploy certificates bas | Tab Name | Configurations | | --- | --- | | *Compatibility* | | - | *General* | | - | *Extensions* | Verify the **Application Policies** extension includes **Smart Card Logon**| - | *Subject Name* |
**Note:** If you deploy certificates via Intune, select **Supply in the request** instead of *Build from this Active Directory*.| - |*Request Handling*|
**Note:** If you deploy certificates via Intune with a PKCS profile, select the option **Allow private key to be exported**| + | *General* | | + | *Extensions* | Verify the **Application Policies** extension includes **Smart Card Logon**.| + | *Subject Name* | Select **Supply in the request**.| + |*Request Handling*|
**Note:** If you deploy certificates with a PKCS profile, select the option **Allow private key to be exported**| |*Cryptography*|