Skip to content

Commit e4a64f1

Browse files
Merge pull request #208808 from Justinha/issue-95892
added domain name variable
2 parents 62b53ca + 5e47f0b commit e4a64f1

File tree

1 file changed

+6
-9
lines changed

1 file changed

+6
-9
lines changed

articles/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises.md

Lines changed: 6 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 02/22/2022
9+
ms.date: 08/22/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -101,13 +101,11 @@ Run the following steps in each domain and forest in your organization that cont
101101
1. Run the following PowerShell commands to create a new Azure AD Kerberos Server object both in your on-premises Active Directory domain and in your Azure Active Directory tenant.
102102

103103
### Example 1 prompt for all credentials
104-
> [!NOTE]
105-
> Replace `contoso.corp.com` in the following example with your on-premises Active Directory domain name.
106104

107105
```powershell
108106
# Specify the on-premises Active Directory domain. A new Azure AD
109107
# Kerberos Server object will be created in this Active Directory domain.
110-
$domain = "contoso.corp.com"
108+
$domain = $env:USERDNSDOMAIN
111109
112110
# Enter an Azure Active Directory global administrator username and password.
113111
$cloudCred = Get-Credential -Message 'An Active Directory user who is a member of the Global Administrators group for Azure AD.'
@@ -127,7 +125,7 @@ Run the following steps in each domain and forest in your organization that cont
127125
```powershell
128126
# Specify the on-premises Active Directory domain. A new Azure AD
129127
# Kerberos Server object will be created in this Active Directory domain.
130-
$domain = "contoso.corp.com"
128+
$domain = $env:USERDNSDOMAIN
131129
132130
# Enter an Azure Active Directory global administrator username and password.
133131
$cloudCred = Get-Credential
@@ -147,7 +145,7 @@ Run the following steps in each domain and forest in your organization that cont
147145
```powershell
148146
# Specify the on-premises Active Directory domain. A new Azure AD
149147
# Kerberos Server object will be created in this Active Directory domain.
150-
$domain = "contoso.corp.com"
148+
$domain = $env:USERDNSDOMAIN
151149
152150
# Enter a UPN of an Azure Active Directory global administrator
153151
$userPrincipalName = "[email protected]"
@@ -164,13 +162,12 @@ Run the following steps in each domain and forest in your organization that cont
164162
### Example 4 prompt for cloud credentials using modern authentication
165163
> [!NOTE]
166164
> If you are working on a domain-joined machine with an account that has domain administrator privileges and your organization protects password-based sign-in and enforces modern authentication methods such as multifactor authentication, FIDO2, or smart card technology, you must use the `-UserPrincipalName` parameter with the User Principal Name (UPN) of a global administrator. And you can skip the "-DomainCredential" parameter.
167-
> - Replace `contoso.corp.com` in the following example with your on-premises Active Directory domain name.
168-
> - Replace `[email protected]` in the following example with the UPN of a global administrator.
165+
> - Replace `[email protected]` in the following example with the UPN of a global administrator.
169166
170167
```powershell
171168
# Specify the on-premises Active Directory domain. A new Azure AD
172169
# Kerberos Server object will be created in this Active Directory domain.
173-
$domain = "contoso.corp.com"
170+
$domain = $env:USERDNSDOMAIN
174171
175172
# Enter a UPN of an Azure Active Directory global administrator
176173
$userPrincipalName = "[email protected]"

0 commit comments

Comments
 (0)