You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: how-to
9
-
ms.date: 09/13/2023
9
+
ms.date: 09/25/2023
10
10
11
11
12
12
ms.author: justinha
@@ -163,7 +163,7 @@ Let's look at an example of a user who has single factor certificates and has co
163
163
164
164
## Understanding the authentication binding policy
165
165
166
-
The authentication binding policy helps determine the strength of authentication as either single-factor or multifactor. An administrator can change the default value from singlefactor to multifactor, or set up custom policy configurations either by using issuer subject or policy OID fields in the certificate.
166
+
The authentication binding policy helps determine the strength of authentication as either single-factor or multifactor. An administrator can change the default value from single-factor to multifactor, or set up custom policy configurations either by using issuer subject or policy OID fields in the certificate.
167
167
168
168
### Certificate strengths
169
169
@@ -192,14 +192,14 @@ The username binding policy helps validate the certificate of the user. By defau
192
192
193
193
### Achieve higher security with certificate bindings
194
194
195
-
There are four supported methods. In general, mapping types are considered high-affinity if they're based on identifiers that you can't reuse (Such as Subject Key Identifiers or SHA1 Public Key). These identifiers convey a higher assurance that only a single certificate can be used to authenticate the respective user. Therefore, all mapping types based on usernames and email addresses are considered low-affinity. Therefore, Microsoft Entra ID implements two mappings considered low-affinity (based on reusable identifiers), and the other two are considered high-affinity bindings. For more information, see [certificateUserIds](concept-certificate-based-authentication-certificateuserids.md).
195
+
There are four supported methods for certificate bindings. In general, mapping types are considered high-affinity if they're based on identifiers that you can't reuse, such as Subject Key Identifiers or SHA1 Public Key. These identifiers convey a higher assurance that only a single certificate can be used to authenticate the respective user. All mapping types based on usernames and email addresses are considered low-affinity. Microsoft Entra ID implements two mappings considered low-affinity based on reusable identifiers. The other two are considered high-affinity bindings. For more information, see [certificateUserIds](concept-certificate-based-authentication-certificateuserids.md).
196
196
197
-
|Certificate mapping Field| Examples of values in certificateUserIds | User object attributes | Type |
197
+
|Certificate mapping field| Examples of values in certificateUserIds | User object attributes | Type |
0 commit comments