Skip to content

Commit 70b9a2c

Browse files
committed
removed quotation marks
1 parent b8e746c commit 70b9a2c

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 09/13/2023
9+
ms.date: 09/25/2023
1010

1111

1212
ms.author: justinha
@@ -163,7 +163,7 @@ Let's look at an example of a user who has single factor certificates and has co
163163

164164
## Understanding the authentication binding policy
165165

166-
The authentication binding policy helps determine the strength of authentication as either single-factor or multifactor. An administrator can change the default value from single factor to multifactor, or set up custom policy configurations either by using issuer subject or policy OID fields in the certificate.
166+
The authentication binding policy helps determine the strength of authentication as either single-factor or multifactor. An administrator can change the default value from single-factor to multifactor, or set up custom policy configurations either by using issuer subject or policy OID fields in the certificate.
167167

168168
### Certificate strengths
169169

@@ -192,14 +192,14 @@ The username binding policy helps validate the certificate of the user. By defau
192192

193193
### Achieve higher security with certificate bindings
194194

195-
There are four supported methods. In general, mapping types are considered high-affinity if they're based on identifiers that you can't reuse (Such as Subject Key Identifiers or SHA1 Public Key). These identifiers convey a higher assurance that only a single certificate can be used to authenticate the respective user. Therefore, all mapping types based on usernames and email addresses are considered low-affinity. Therefore, Microsoft Entra ID implements two mappings considered low-affinity (based on reusable identifiers), and the other two are considered high-affinity bindings. For more information, see [certificateUserIds](concept-certificate-based-authentication-certificateuserids.md).
195+
There are four supported methods for certificate bindings. In general, mapping types are considered high-affinity if they're based on identifiers that you can't reuse, such as Subject Key Identifiers or SHA1 Public Key. These identifiers convey a higher assurance that only a single certificate can be used to authenticate the respective user. All mapping types based on usernames and email addresses are considered low-affinity. Microsoft Entra ID implements two mappings considered low-affinity based on reusable identifiers. The other two are considered high-affinity bindings. For more information, see [certificateUserIds](concept-certificate-based-authentication-certificateuserids.md).
196196

197-
|Certificate mapping Field | Examples of values in certificateUserIds | User object attributes | Type |
197+
|Certificate mapping field | Examples of values in certificateUserIds | User object attributes | Type |
198198
|--------------------------|--------------------------------------|------------------------|----------|
199-
|PrincipalName | X509:\<PN>[email protected] | userPrincipalName <br> onPremisesUserPrincipalName <br> certificateUserIds | low-affinity |
200-
|RFC822Name | X509:\<RFC822>[email protected] | userPrincipalName <br> onPremisesUserPrincipalName <br> certificateUserIds | low-affinity |
201-
|X509SKI | X509:\<SKI>123456789abcdef| certificateUserIds | high-affinity |
202-
|X509SHA1PublicKey |X509:\<SHA1-PUKEY>123456789abcdef | certificateUserIds | high-affinity |
199+
|PrincipalName | X509:\<PN>[email protected] | userPrincipalName <br> onPremisesUserPrincipalName <br> certificateUserIds | low-affinity |
200+
|RFC822Name | X509:\<RFC822>[email protected] | userPrincipalName <br> onPremisesUserPrincipalName <br> certificateUserIds | low-affinity |
201+
|X509SKI | X509:\<SKI>123456789abcdef| certificateUserIds | high-affinity |
202+
|X509SHA1PublicKey |X509:\<SHA1-PUKEY>123456789abcdef | certificateUserIds | high-affinity |
203203

204204
<a name='how-azure-ad-resolves-multiple-username-policy-binding-rules'></a>
205205

0 commit comments

Comments
 (0)