Skip to content

Commit b6858ae

Browse files
authored
Merge pull request #7160 from Brenduns/trusted-root-encoding
Revision based on PM feedback > issue #2350
2 parents b4ec51c + 3b7fef5 commit b6858ae

1 file changed

Lines changed: 2 additions & 2 deletions

File tree

memdocs/intune/protect/certificates-trusted-root.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 06/03/2021
10+
ms.date: 03/29/2022
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -41,7 +41,7 @@ You deploy the trusted certificate profile to the same devices and users that re
4141

4242
To use PKCS, SCEP, and PKCS imported certificates, devices must trust your root Certification Authority. To establish trust, export the Trusted Root CA certificate, and any intermediate or issuing Certification Authority certificates, as a public certificate (.cer). You can get these certificates from the issuing CA, or from any device that trusts your issuing CA.
4343

44-
To export the certificate, refer to the documentation for your Certification Authority. You'll need to export the public certificate as a .cer file. Don't export the private key, a .pfx file.
44+
To export the certificate, refer to the documentation for your Certification Authority. You'll need to export the public certificate as a DER-encoded .cer file. Don't export the private key, a .pfx file.
4545

4646
You'll use this .cer file when you [create trusted certificate profiles](#create-trusted-certificate-profiles) to deploy that certificate to your devices.
4747

0 commit comments

Comments
 (0)