From a596fd77a83f686f142db76ffde0d18e013f01e7 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Sun, 10 Dec 2023 09:31:33 -0500 Subject: [PATCH] Update certificate template configuration --- .../hello-for-business/rdp-sign-in2.md | 30 ++++++++----------- 1 file changed, 13 insertions(+), 17 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/rdp-sign-in2.md b/windows/security/identity-protection/hello-for-business/rdp-sign-in2.md index 7ab9e96a69..5979c0db85 100644 --- a/windows/security/identity-protection/hello-for-business/rdp-sign-in2.md +++ b/windows/security/identity-protection/hello-for-business/rdp-sign-in2.md @@ -55,7 +55,7 @@ If you plan to deploy certificates using Microsoft Intune, here are additional r The process of creating a certificate template is applicable to scenarios where you use an on-premises Active Directory Certificate Services (AD CS) infrastrusture.\ You must first create a certificate template, and then deploy certificates based on that template to the Windows Hello for Business container. -The process is different depending on whether you deploy certificates using an AD CS enrollment policy or Microsoft Intune. Select the option that best suits your needs. +The certificate template configuration is different depending on whether you deploy certificates using Microsoft Intune or an AD CS enrollment policy. Select the option that best suits your needs. # [:::image type="icon" source="../../images/icons/intune.svg" border="false"::: **Microsoft Intune**](#tab/intune) @@ -72,9 +72,9 @@ The process is different depending on whether you deploy certificates using an A | *General* | | | *Extensions* | Verify the **Application Policies** extension includes **Smart Card Logon**.| | *Subject Name* | Select **Supply in the request**.| - |*Request Handling*|
**Note:** If you deploy certificates via Intune with a PKCS profile, select the option **Allow private key to be exported**| + |*Request Handling*|
**Note:** If you deploy certificates with a PKCS profile, select the option **Allow private key to be exported**| |*Cryptography*|