mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-28 13:17:23 +00:00
Update hello-hybrid-aadj-sso-cert.md
Minor changes: corrected 1 x typo and 1 x bad formatting.
This commit is contained in:
parent
7f5f441c66
commit
bc78f83a1f
@ -636,7 +636,7 @@ Sign-in a workstation with access equivalent to a _domain user_.
|
||||
8. Click **Members**. Use the **Select members** pane to add members to this group. When finished click **Select**.
|
||||
9. Click **Create**.
|
||||
|
||||
### Create a SCEP Certificte Profile
|
||||
### Create a SCEP Certificate Profile
|
||||
Sign-in a workstation with access equivalent to a _domain user_.
|
||||
|
||||
1. Sign-in to the [Azure Portal](https://portal.azure.com/).
|
||||
@ -659,7 +659,7 @@ Sign-in a workstation with access equivalent to a _domain user_.
|
||||
13. Refer to the "Configure Certificate Templates on NDES" task for how you configured the **AADJ WHFB Authentication** certificate template in the registry. Select the appropriate combination of key usages from the **Key Usages** list that map to configured NDES template in the registry. In this example, the **AADJ WHFB Authentication** certificate template was added to the **SignatureTemplate** registry value name. The **Key usage** that maps to that registry value name is **Digital Signature**.
|
||||
14. Select a previously configured **Trusted certificate** profile that matches the root certificate of the issuing certificate authority.
|
||||

|
||||
15. Under **Extended key usage**, type **Smart Card Logon** under <strong>Name. Type **1.3.6.1.4.1.311.20.2.2</strong> under **Object identifier**. Click **Add**.
|
||||
15. Under **Extended key usage**, type **Smart Card Logon** under **Name**. Type **1.3.6.1.4.1.311.20.2.2** under **Object identifier**. Click **Add**.
|
||||
16. Type a percentage (without the percent sign) next to **Renewal Threshold** to determine when the certificate should attempt to renew. The recommended value is **20**.
|
||||

|
||||
17. Under **SCEP Server URLs**, type the fully qualified external name of the Azure AD Application proxy you configured. Append to the name **/certsrv/mscep/mscep.dll**. For example, https://ndes-mtephendemo.msappproxy.net/certsrv/mscep/mscep.dll. Click **Add**. Repeat this step for each additional NDES Azure AD Application Proxy you configured to issue Windows Hello for Business certificates. Microsoft Intune round-robin load balances requests amongst the URLs listed in the SCEP certificate profile.
|
||||
|
Loading…
x
Reference in New Issue
Block a user