Skip to content

Commit f98b763

Browse files
Apply suggestions from code review
Commit changes accepted Co-authored-by: stuart-jaeckel-netwrix <[email protected]>
1 parent 2f6701b commit f98b763

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

docs/pingcastle/3.3/enterpriseinstall.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -242,21 +242,21 @@ the following actions as admin in powershell:
242242
```powershell
243243
# connect to the task scheduler service
244244
245-
**$scheduleObject = New-Object -ComObject schedule.service**
245+
$scheduleObject = New-Object -ComObject schedule.service
246246
247247
$scheduleObject.connect()
248248
249-
**$rootFolder = $scheduleObject.GetFolder("")**
249+
$rootFolder = $scheduleObject.GetFolder("")
250250
251251
$PingCastleFolder = $rootFolder.GetFolder("PingCastle")
252252
253-
**$PingCastleFolder.GetTasks(1) | Foreach-Object {**
253+
$PingCastleFolder.GetTasks(1) | Foreach-Object {
254254
255255
$sddl = $_.GetSecurityDescriptor(1+2+4+8)
256256
257257
# add full control to the task
258258
259-
**$sddl += "(A;S-1-XXX-XXX-XXX;FA;;;SY)"**
259+
$sddl += "(A;S-1-XXX-XXX-XXX;FA;;;SY)"
260260
261261
$_.SetSecurityDescriptor($sddl, 0)
262262
@@ -352,13 +352,13 @@ The following SQL can grant these permissions:
352352
```sql
353353
If not Exists (select loginname from master.dbo.syslogins
354354

355-
**where loginname = 'IIS APPPOOL\PingCastleEnterprise')**
355+
where loginname = 'IIS APPPOOL\PingCastleEnterprise')
356356

357357
Begin
358358

359359
CREATE LOGIN [IIS APPPOOL\PingCastleEnterprise] FROM WINDOWS;
360360

361-
**End**
361+
End
362362

363363
use PingCastleEnterprise;
364364

@@ -673,11 +673,11 @@ to the following one:
673673
```json
674674
"OpenIdConnect": {
675675

676-
**"DisplayName": "AzureAD",**
676+
"DisplayName": "AzureAD",
677677

678678
"ClientId": "<ClientID>",
679679

680-
**"Authority": "https://login.microsoftonline.com/<tenant-id>/",**
680+
"Authority": "https://login.microsoftonline.com/<tenant-id>/",
681681

682682
}
683683
```
@@ -814,7 +814,7 @@ When using ADFS, the well known configuration is:
814814
```json
815815
"Saml2": {
816816

817-
**"Issuer": "https://xxx/Saml2/Login",**
817+
"Issuer": "https://xxx/Saml2/Login",
818818

819819
"IdPMetadata":
820820
"https://xxx/FederationMetadata/2007-06/FederationMetadata.xml"

0 commit comments

Comments
 (0)