@@ -242,21 +242,21 @@ the following actions as admin in powershell:
242242``` powershell
243243# connect to the task scheduler service
244244
245- ** $scheduleObject = New-Object -ComObject schedule.service**
245+ $scheduleObject = New-Object -ComObject schedule.service
246246
247247$scheduleObject.connect()
248248
249- ** $rootFolder = $scheduleObject.GetFolder("")**
249+ $rootFolder = $scheduleObject.GetFolder("")
250250
251251$PingCastleFolder = $rootFolder.GetFolder("PingCastle")
252252
253- ** $PingCastleFolder.GetTasks(1) | Foreach-Object {**
253+ $PingCastleFolder.GetTasks(1) | Foreach-Object {
254254
255255$sddl = $_.GetSecurityDescriptor(1+2+4+8)
256256
257257# add full control to the task
258258
259- ** $sddl += "(A;S-1-XXX-XXX-XXX;FA;;;SY)"**
259+ $sddl += "(A;S-1-XXX-XXX-XXX;FA;;;SY)"
260260
261261$_.SetSecurityDescriptor($sddl, 0)
262262
@@ -352,13 +352,13 @@ The following SQL can grant these permissions:
352352``` sql
353353If not Exists (select loginname from master .dbo .syslogins
354354
355- ** where loginname = ' IIS APPPOOL\P ingCastleEnterprise' )**
355+ where loginname = ' IIS APPPOOL\P ingCastleEnterprise' )
356356
357357Begin
358358
359359CREATE LOGIN [IIS APPPOOL\PingCastleEnterprise] FROM WINDOWS;
360360
361- ** End**
361+ End
362362
363363use PingCastleEnterprise;
364364
@@ -673,11 +673,11 @@ to the following one:
673673``` json
674674"OpenIdConnect" : {
675675
676- ** "DisplayName": "AzureAD",**
676+ "DisplayName" : " AzureAD" ,
677677
678678"ClientId" : " <ClientID>" ,
679679
680- ** "Authority": "https://login.microsoftonline.com/<tenant-id>/",**
680+ "Authority" : " https://login.microsoftonline.com/<tenant-id>/" ,
681681
682682}
683683```
@@ -814,7 +814,7 @@ When using ADFS, the well known configuration is:
814814``` json
815815"Saml2" : {
816816
817- ** "Issuer": "https://xxx/Saml2/Login",**
817+ "Issuer" : " https://xxx/Saml2/Login" ,
818818
819819"IdPMetadata" :
820820" https://xxx/FederationMetadata/2007-06/FederationMetadata.xml"
0 commit comments