Update windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md

Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
This commit is contained in:
ImranHabib 2019-11-23 11:26:03 +05:00 committed by GitHub
parent be4300497a
commit baac14d30f
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -42,7 +42,7 @@ This policy is not configured by default on domain-joined devices. This would di
This will allow authentication to successfully complete between the two (or more) computers that have established a peer relationship through the use on online IDs. The PKU2U SSP obtains a local certificate and exchanges the policy between the peer devices. When validated on the peer computer, the certificate within the metadata is sent to the logon peer for validation. It associates the user's certificate to a security token, and then the logon process completes.
> [!Note]
> KU2U is disabled by default on server SKUs and thus RDP from a hybrid Azure AD joined server to a Azure AD joined Windows 10 device or Hybrid Azure AD joined domain member Windows 10 device fails. To resolve this, PKU2U needs to be enabled on the server SKU.
> KU2U is disabled by default on server SKUs and thus, RDP from a hybrid Azure AD joined server to an Azure AD joined Windows 10 device, or Hybrid Azure AD joined domain member Windows 10 device, fails. To resolve this, PKU2U needs to be enabled on the server SKU.
- **Disabled**