Skip to content

Commit 425f077

Browse files
committed
Learn Editor: Update certificate-requirements-eap-tls-peap.md
1 parent 9e4b431 commit 425f077

1 file changed

Lines changed: 3 additions & 2 deletions

File tree

support/windows-server/networking/certificate-requirements-eap-tls-peap.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,8 @@ With either EAP-TLS or PEAP with EAP-TLS, the server accepts the client's authen
3434
- The user or the computer certificate on the client chains to a trusted root CA.
3535
- The user or the computer certificate on the client includes the **Client Authentication** purpose.
3636
- The user or the computer certificate doesn't fail any one of the checks that are performed by the CryptoAPI certificate store. And the certificate passes requirements in the remote access policy.
37-
- The user or the computer certificate doesn't fail any one of the certificate OID checks that are specified in the Network Policy Server (NPS) remote access policy.
37+
- The user or the computer certificate doesn't fail any one of the certificates OID checks that are specified in the Network Policy Server (NPS) remote access policy.
38+
3839
- The 802.1X client doesn't use registry-based certificates that are either smart-card certificates or certificates that are protected with a password.
3940
- The Subject Alternative Name (SubjectAltName) extension in the certificate contains the user principal name (UPN) of the user.
4041
- When clients use EAP-TLS or PEAP with EAP-TLS authentication, a list of all the installed certificates is displayed in the Certificates snap-in, with the following exceptions:
@@ -63,7 +64,7 @@ You can configure clients to validate server certificates by using the **Validat
6364
- If the client is configured to trust a server certificate with a specific name, the user is prompted to decide about trusting a certificate with a different name. If the user rejects the certificate, authentication fails. If the user accepts the certificate, the certificate is added to the local computer trusted root certificate store.
6465

6566
> [!NOTE]
66-
> With PEAP or with EAP-TLS authentication, servers display a list of all the installed certificates in the Certificates snap-in. However, the certificates that contain the **Server Authentication** purpose in EKU extensions are not displayed.
67+
> With PEAP or with EAP-TLS authentication, servers display a list of all the installed certificates in the Certificates snap-in. However, the certificates that don't contain the **Server Authentication** purpose in EKU extensions are not displayed.
6768
6869
## More information
6970

0 commit comments

Comments
 (0)