Skip to content

Commit b4c3a97

Browse files
authored
Merge pull request #189341 from Justinha/issue-88282
Update howto-authentication-passwordless-security-key-on-premises.md
2 parents 3a2b4cd + 49270a2 commit b4c3a97

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 02/22/2021
9+
ms.date: 02/22/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -25,7 +25,7 @@ Azure AD can issue Kerberos ticket-granting tickets (TGTs) for one or more of yo
2525

2626
An Azure AD Kerberos Server object is created in your on-premises Active Directory instance and then securely published to Azure Active Directory. The object isn't associated with any physical servers. It's simply a resource that can be used by Azure Active Directory to generate Kerberos TGTs for your Active Directory domain.
2727

28-
:::image type="Image" source="./media/howto-authentication-passwordless-on-premises/fido2-ticket-granting-ticket-exchange-process.png" alt-text="Diagram showing how to get a T G T from Azure AD and Active Directory Domain Services." lightbox="./media/howto-authentication-passwordless-on-premises/fido2-ticket-granting-ticket-exchange-process.png":::
28+
:::image type="Image" source="./media/howto-authentication-passwordless-on-premises/fido2-ticket-granting-ticket-exchange-process.png" alt-text="Diagram showing how to get a TGT from Azure AD and Active Directory Domain Services." lightbox="./media/howto-authentication-passwordless-on-premises/fido2-ticket-granting-ticket-exchange-process.png":::
2929

3030
1. A user signs in to a Windows 10 device with an FIDO2 security key and authenticates to Azure AD.
3131
1. Azure AD checks the directory for a Kerberos Server key that matches the user's on-premises Active Directory domain.
@@ -107,7 +107,7 @@ Run the following steps in each domain and forest in your organization that cont
107107
$domain = "contoso.corp.com"
108108
109109
# Enter an Azure Active Directory global administrator username and password.
110-
$cloudCred = Get-Credential -Message 'An Active Directory user who is a member of the Domain Admins group for a domain and a member of the Enterprise Admins group for a forest.'
110+
$cloudCred = Get-Credential -Message 'An Active Directory user who is a member of the Global Administrators group for Azure AD.'
111111
112112
# Enter a domain administrator username and password.
113113
$domainCred = Get-Credential -Message 'An Active Directory user who is a member of the Domain Admins group.'

0 commit comments

Comments
 (0)