Update windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-pki.md

Co-authored-by: mapalko <mapalko@microsoft.com>
This commit is contained in:
ImranHabib 2021-02-19 10:42:12 +05:00 committed by GitHub
parent a2f324116b
commit cec0159439
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -83,7 +83,7 @@ The certificate template is configured to supersede all the certificate template
> [!NOTE] > [!NOTE]
> The certificate for the CA issuing the domain controller certificate must be included in the NTAuth store. By default, the Active Directory Certificate Authority's root certificate is added to the NTAuth store. If you are using a multi-tier CA hierarchy or a third-party CA, this may not be done by default. If the Domain Controller certificate does not directly chain to a CA certificate in the NTAuth store, user authentication will fail. > The certificate for the CA issuing the domain controller certificate must be included in the NTAuth store. By default, the Active Directory Certificate Authority's root certificate is added to the NTAuth store. If you are using a multi-tier CA hierarchy or a third-party CA, this may not be done by default. If the Domain Controller certificate does not directly chain to a CA certificate in the NTAuth store, user authentication will fail.
The following PowerShell command can be used to check the NTAuth certificate: The following PowerShell command can be used to check all certificates in the NTAuth store:
```powershell ```powershell
Certutil -viewstore -enterprise NTAuth Certutil -viewstore -enterprise NTAuth