Skip to content

Commit 826fee4

Browse files
Merge pull request #228089 from Justinha/cert-issue
Update certificate-based-authentication-faq.yml
2 parents 9c7c2e9 + 1f93126 commit 826fee4

File tree

1 file changed

+16
-7
lines changed

1 file changed

+16
-7
lines changed

articles/active-directory/authentication/certificate-based-authentication-faq.yml

Lines changed: 16 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,9 @@ metadata:
77
ms.service: active-directory
88
ms.subservice: authentication
99
ms.topic: faq
10-
ms.date: 10/05/2022
10+
ms.date: 02/21/2023
1111
ms.author: justinha
12-
author: vimrang
12+
author: justinha
1313
manager: amycolannino
1414
ms.reviewer: vimrang
1515
ms.collection: M365-identity-device-management
@@ -69,7 +69,7 @@ sections:
6969
7070
Use the [Set-AzureADTrustedCertificateAuthority](/powershell/module/azuread/set-azureadtrustedcertificateauthority) cmdlet:
7171
72-
```powershell
72+
```PowerShell
7373
$c=Get-AzureADTrustedCertificateAuthority
7474
$c[0]. crlDistributionPoint=""
7575
Set-AzureADTrustedCertificateAuthority -CertificateAuthorityInformation $c[0]
@@ -120,14 +120,14 @@ sections:
120120
The browser caches the certificate after the certificate picker appears. If the user retries, the cached certificate is used automatically. The user should close the browser, and reopen a new session to try CBA again.
121121
122122
- question: |
123-
Why does not proof up for registering other auth methods come up when I use single factor certificates?
123+
Why doesn't proof up for registering other auth methods come up when I use single factor certificates?
124124
answer: |
125-
A user will be considered MFA capable when a user is in scope for Certificate-based authentication auth method. This means user will not be able to use proof up as part of their authentication to registerd other available methods and should have MFA via another method to register other available auth methods.
125+
A user is considered capable for MFA when the user is in scope for **Certificate-based authentication** in the Authentication methods policy. This policy requirement means a user can't use proof up as part of their authentication to register other available methods.
126126
127127
- question: |
128128
How can I use single-factor certificates to complete MFA?
129129
answer: |
130-
We have support for single factor CBA to get MFA. CBA SF + PSI (passwordless phone sign in) and CBA SF + FIDO2 are the two supported combinations to get MFA using single factor certificates.
130+
We have support for single factor CBA to get MFA. CBA SF + passwordless phone sign-in (PSI) and CBA SF + FIDO2 are the two supported combinations to get MFA using single factor certificates.
131131
[MFA with single factor certificates](../authentication/concept-certificate-based-authentication-technical-deep-dive.md#mfa-authentication-flow-using-single-factor-certificates-and-passwordless-sign-in)
132132
133133
- question: |
@@ -146,7 +146,16 @@ sections:
146146
GET https://graph.microsoft.com/v1.0/users?$filter=certificateUserIds/any(x:x eq '[email protected]')
147147
```
148148
149-
149+
- question: |
150+
After a CRL endpoint is configured, end users aren't able to sign in and they see the following diagnostic message:
151+
152+
```http
153+
AADSTS500173: Unable to download CRL. Invalid status code Forbidden from CRL distribution point
154+
errorCode: 500173
155+
```
156+
157+
answer: |
158+
This is commonly seen when a firewall rule setting blocks access to the CRL endpoint.
150159
151160
additionalContent: |
152161
## Next steps

0 commit comments

Comments
 (0)