You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/app-proxy/app-proxy-protect-ndes.md
+3-8Lines changed: 3 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -74,17 +74,12 @@ Azure AD Application Proxy is built on Azure. It gives you a massive amount of n
74
74
1. Select **+Add** to save your application.
75
75
76
76
1. Test whether you can access your NDES server via the Azure AD Application proxy by pasting the link you copied in step 15 into a browser. You should see a default IIS welcome page.
77
-
78
77
1. As a final test, add the *mscep.dll* path to the existing URL you pasted in the previous step:
1. You should see an **HTTP Error 403 – Forbidden** response.
83
-
84
80
1. Change the NDES URL provided (via Microsoft Intune) to devices. This change could either be in Microsoft Configuration Manager or the Microsoft Intune admin center.
85
-
86
-
* For Configuration Manager, go to the certificate registration point and adjust the URL. This URL is what devices call out to and present their challenge.
87
-
* For Intune standalone, either edit or create a new SCEP policy and add the new URL.
81
+
- For Configuration Manager, go to the certificate registration point and adjust the URL. This URL is what devices call out to and present their challenge.
82
+
- For Intune standalone, either edit or create a new SCEP policy and add the new URL.
0 commit comments