Skip to content

Commit 00eb61c

Browse files
Resolve sync PR issue
1 parent 3af782b commit 00eb61c

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -70,8 +70,8 @@ Let's cover each step:
7070
7171
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/cert-picker.png" alt-text="Screenshot of the certificate picker." lightbox="./media/concept-certificate-based-authentication-technical-deep-dive/cert-picker.png":::
7272

73-
1. Azure AD verifies the certificate revocation list to make sure the certificate is not revoked and is valid. Azure AD identifies the user in the tenant by using the [username binding configured](how-to-certificate-based-authentication.md#step-3-configure-username-binding-policy) on the tenant by mapping the certificate field value to user attribute value.
74-
1. If a unique user is found and the user has a conditional access policy and needs multifactor authentication (MFA) and the [certificate authentication binding rule](how-to-certificate-based-authentication.md#step-2-configure-authentication-binding-policy) satisfies MFA, then Azure AD signs the user in immediately. If the certificate satisfies only a single factor, then it requests the user for a second factor to complete Azure AD Multi-Factor Authentication.
73+
1. Azure AD verifies the certificate revocation list to make sure the certificate is not revoked and is valid. Azure AD identifies the user in the tenant by using the [username binding configured](how-to-certificate-based-authentication.md#step-4-configure-username-binding-policy) on the tenant by mapping the certificate field value to user attribute value.
74+
1. If a unique user is found and the user has a conditional access policy and needs multifactor authentication (MFA) and the [certificate authentication binding rule](how-to-certificate-based-authentication.md#step-3-configure-authentication-binding-policy) satisfies MFA, then Azure AD signs the user in immediately. If the certificate satisfies only a single factor, then it requests the user for a second factor to complete Azure AD Multi-Factor Authentication.
7575
1. Azure AD completes the sign-in process by sending a primary refresh token back to indicate successful sign-in.
7676
1. If the user sign-in is successful, the user can access the application.
7777

@@ -244,4 +244,4 @@ For the next test scenario, configure the authentication policy where the **poli
244244
- [Windows SmartCard logon using Azure AD CBA](concept-certificate-based-authentication-smartcard.md)
245245
- [Azure AD CBA on mobile devices (Android and iOS)](concept-certificate-based-authentication-mobile.md)
246246
- [FAQ](certificate-based-authentication-faq.yml)
247-
- [Troubleshoot Azure AD CBA](troubleshoot-certificate-based-authentication.md)
247+
- [Troubleshoot Azure AD CBA](troubleshoot-certificate-based-authentication.md)

0 commit comments

Comments
 (0)