Skip to content

Commit 573fe61

Browse files
authored
Fixes formatting.
1 parent bc13871 commit 573fe61

File tree

1 file changed

+3
-8
lines changed

1 file changed

+3
-8
lines changed

articles/active-directory/app-proxy/app-proxy-protect-ndes.md

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -74,17 +74,12 @@ Azure AD Application Proxy is built on Azure. It gives you a massive amount of n
7474
1. Select **+Add** to save your application.
7575

7676
1. Test whether you can access your NDES server via the Azure AD Application proxy by pasting the link you copied in step 15 into a browser. You should see a default IIS welcome page.
77-
7877
1. As a final test, add the *mscep.dll* path to the existing URL you pasted in the previous step:
79-
80-
`https://scep-test93635307549127448334.msappproxy.net/certsrv/mscep/mscep.dll`
81-
78+
`https://scep-test93635307549127448334.msappproxy.net/certsrv/mscep/mscep.dll`
8279
1. You should see an **HTTP Error 403 – Forbidden** response.
83-
8480
1. Change the NDES URL provided (via Microsoft Intune) to devices. This change could either be in Microsoft Configuration Manager or the Microsoft Intune admin center.
85-
86-
* For Configuration Manager, go to the certificate registration point and adjust the URL. This URL is what devices call out to and present their challenge.
87-
* For Intune standalone, either edit or create a new SCEP policy and add the new URL.
81+
- For Configuration Manager, go to the certificate registration point and adjust the URL. This URL is what devices call out to and present their challenge.
82+
- For Intune standalone, either edit or create a new SCEP policy and add the new URL.
8883

8984
## Next steps
9085

0 commit comments

Comments
 (0)