Skip to content

Commit b74f171

Browse files
authored
Merge pull request #99854 from iainfoulds/patch-2
[AzureADDS] Fixes MicrosoftDocs/azure-docs#45319
2 parents 9201b06 + 8f71537 commit b74f171

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/active-directory-domain-services/tutorial-configure-ldaps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ The certificate you request or create must meet the following requirements. Your
6161

6262
* **Trusted issuer** - The certificate must be issued by an authority trusted by computers connecting to the managed domain using secure LDAP. This authority may be a public CA or an Enterprise CA trusted by these computers.
6363
* **Lifetime** - The certificate must be valid for at least the next 3-6 months. Secure LDAP access to your managed domain is disrupted when the certificate expires.
64-
* **Subject name** - The subject name on the certificate must be your managed domain. For instance, if your domain is named *aadds.contoso.com*, the certificate's subject name must be **aadds.contoso.com*.
64+
* **Subject name** - The subject name on the certificate must be your managed domain. For instance, if your domain is named *aadds.contoso.com*, the certificate's subject name must be **.aadds.contoso.com*.
6565
* The DNS name or subject alternate name of the certificate must be a wildcard certificate to ensure the secure LDAP works properly with the Azure AD Domain Services. Domain Controllers use random names and can be removed or added to ensure the service remains available.
6666
* **Key usage** - The certificate must be configured for *digital signatures* and *key encipherment*.
6767
* **Certificate purpose** - The certificate must be valid for SSL server authentication.

0 commit comments

Comments
 (0)