Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ASA ja-JP translation update #496

Merged
merged 3 commits into from
Oct 12, 2022
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion asa/Resources/Scripts/require.config.js
Original file line number Diff line number Diff line change
@@ -1,3 +1,3 @@
require.config({
urlArgs: 't=637999742482092986'
urlArgs: 't=638011783903966104'
});
Original file line number Diff line number Diff line change
Expand Up @@ -315,15 +315,15 @@ <h1>Create a certificate using a certificate signing request</h1>
<div>
<h3>Before you begin</h3>
<ul>
<li>Install Active Directory Certificate Services as a root CA&#160;for the domain. See <a href="https://docs.microsoft.com/en-us/windows-server/networking/core-network-guide/cncg/server-certs/install-the-certification-authority" target="_blank">Install the Certification Authority</a>.</li>
<li>Install Active Directory Certificate Services as a root CA for the domain. See <a href="https://docs.microsoft.com/en-us/windows-server/networking/core-network-guide/cncg/server-certs/install-the-certification-authority" target="_blank">Install the Certification Authority</a>.</li>
</ul>
</div>
<h3>Start this task</h3>
<ol>
<li value="1">Create a CSR in <span class="mc-variable okta-feature-names.ScaleFT variable">Advanced Server Access</span>.
<ol style="list-style-type: lower-alpha;"><li value="1">Open the <span class="mc-variable okta-feature-names.ScaleFT variable">Advanced Server Access</span> dashboard.</li><li value="2">In the user menu, click <span class="uicontrol">Team Settings</span>.</li><li value="3">Go to the <span class="uicontrol">Passwordless Certificates</span> tab.&#160;</li><li value="4">Click <span class="uicontrol">Create</span> &gt; <span class="uicontrol">Certificate Signing Request</span>.</li><li value="5">In the Create Certificate Signing Request window, configure the certificate settings.</li><li value="6">Click <span class="uicontrol">Create Certificate Signing Request</span>.<br />Your device downloads the CSR. Move this file to an AD domain controller.</li></ol></li>
<li value="2">Create a certificate template on an AD Certificate Services (CS) server.&#160;<ol style="list-style-type: lower-alpha;"><li value="1">Open the <span class="uicontrol">Certification Authority</span>.</li><li value="2">Right-click <span class="uicontrol">Certificate Templates</span> and select <span class="uicontrol">Manage</span>. The <span class="wintitle">Certificate Templates Console</span> window opens.</li><li value="3">Right-click <span class="uicontrol">Subordinate Certification Authority</span> and select <span class="uicontrol">Duplicate Template</span>. A properties window opens.<br /></li><li value="4">In the General tab, under Template Display Name, enter <span class="userinput">ADPasswordless</span>.</li><li value="5">In the Extensions tab, select <span class="uicontrol">Application Policy</span> and then click <span class="uicontrol">Edit</span>. The <span class="wintitle">Edit Application Policies Extension</span> window opens.</li><li value="6">Click <span class="uicontrol">Add</span>. The <span class="wintitle">Add Application Policy</span> window opens.</li><li value="7">Select <span class="uicontrol">Smart Card Logon</span> and <span class="uicontrol">Client Authentication</span>, then click <span class="uicontrol">OK</span>.</li><li value="8">In the <span class="wintitle">Edit Application Policies Extension</span> window, click <span class="uicontrol">OK</span>.</li></ol></li>
<li value="3">Issue a certificate.&#160;<br />&#160;Note: Adjust the following commands to use the name of your CSR.<ol style="list-style-type: lower-alpha;"><li value="1">Return to the <span class="uicontrol">Certification Authority</span>.</li><li value="2">Right-click <span class="uicontrol">Certificate Templates</span> and go to <span class="uicontrol">New</span> &gt; <span class="uicontrol">Certificate Template to Issue</span>.</li><li value="3">From the <span class="wintitle">Enable Certificate Templates</span> window, select the certificate template you created and click <span class="uicontrol">OK</span>.</li><li value="4">Open a command prompt as an administrator.</li><li value="5">Navigate to the directory where you stored the CSR and enter the following command:<br /><span class="userinput">certreq -attrib "CertificateTemplate:ADPasswordless" -submit "YOUR_TEAM_CSR" "YOUR_SAVED_CERT"</span></li><li value="6">From the confirmation window, select the related CA and click <span class="uicontrol">OK</span>.<br />The AD CS service issues a certificate and saves a certificate file with Base-64 encoding.</li></ol></li>
<ol style="list-style-type: lower-alpha;"><li value="1">Open the <span class="mc-variable okta-feature-names.ScaleFT variable">Advanced Server Access</span> dashboard.</li><li value="2">In the user menu, click <span class="uicontrol">Team Settings</span>.</li><li value="3">Go to the <span class="uicontrol">Passwordless Certificates</span> tab. </li><li value="4">Click <span class="uicontrol">Create</span> &gt; <span class="uicontrol">Certificate Signing Request</span>.</li><li value="5">In the Create Certificate Signing Request window, configure the certificate settings.</li><li value="6">Click <span class="uicontrol">Create Certificate Signing Request</span>.<br />Your device downloads the CSR. Move this file to an AD domain controller.</li></ol></li>
<li value="2">Create a certificate template on an AD Certificate Services (CS) server. <ol style="list-style-type: lower-alpha;"><li value="1">Open the <span class="uicontrol">Certification Authority</span>.</li><li value="2">Right-click <span class="uicontrol">Certificate Templates</span> and select <span class="uicontrol">Manage</span>. The <span class="wintitle">Certificate Templates Console</span> window opens.</li><li value="3">Right-click <span class="uicontrol">Subordinate Certification Authority</span> and select <span class="uicontrol">Duplicate Template</span>. A properties window opens.<br /></li><li value="4">In the General tab, under Template Display Name, enter <span class="userinput">ADPasswordless</span>.</li><li value="5">In the Extensions tab, select <span class="uicontrol">Application Policy</span> and then click <span class="uicontrol">Edit</span>. The <span class="wintitle">Edit Application Policies Extension</span> window opens.</li><li value="6">Click <span class="uicontrol">Add</span>. The <span class="wintitle">Add Application Policy</span> window opens.</li><li value="7">Select <span class="uicontrol">Smart Card Logon</span> and <span class="uicontrol">Client Authentication</span>, then click <span class="uicontrol">OK</span>.</li><li value="8">In the <span class="wintitle">Edit Application Policies Extension</span> window, click <span class="uicontrol">OK</span>.</li></ol></li>
<li value="3">Issue a certificate. <br /> Note: Adjust the following commands to use the name of your CSR.<ol style="list-style-type: lower-alpha;"><li value="1">Return to the <span class="uicontrol">Certification Authority</span>.</li><li value="2">Right-click <span class="uicontrol">Certificate Templates</span> and go to <span class="uicontrol">New</span> &gt; <span class="uicontrol">Certificate Template to Issue</span>.</li><li value="3">From the <span class="wintitle">Enable Certificate Templates</span> window, select the certificate template you created and click <span class="uicontrol">OK</span>.</li><li value="4">Open a command prompt as an administrator.</li><li value="5">Navigate to the directory where you stored the CSR and enter the following command:<br /><span class="userinput">certreq -attrib "CertificateTemplate:ADPasswordless" -submit "YOUR_TEAM_CSR" "YOUR_SAVED_CERT"</span></li><li value="6">From the confirmation window, select the related CA and click <span class="uicontrol">OK</span>.<br />The AD CS service issues a certificate and saves a certificate file with Base-64 encoding.</li></ol></li>
<li value="4">Import the certificate to the <span class="uicontrol">Trusted Root Certification Authorities</span> store.<ol style="list-style-type: lower-alpha;"><li value="1">Double-click the issued certificate.</li><li value="2">From the certificate window, click <span class="uicontrol">Install Certificate</span>.</li><li value="3">From the <span class="wintitle">Certificate Import Wizard</span> window, click <span class="uicontrol">Next</span></li><li value="4">Select <span class="uicontrol">Place all certificates in the following store</span> and click <span class="uicontrol">Browse</span>.</li><li value="5">From the browse window, select <span class="uicontrol">Trusted Root Certification Authorities</span> and click <span class="uicontrol">OK</span>.</li><li value="6">Click <span class="uicontrol">Next</span></li><li value="7">Review the information and click <span class="uicontrol">Finish</span>.<br />AD imports the certificate.</li></ol></li>
<li value="5">Import the certificate into AD.<br />Note: Adjust the following commands to use the name of the saved certificate file.<br /><ol style="list-style-type: lower-alpha;"><li value="1">Return to the command prompt and navigate to the directory where you saved the certificate.</li><li value="2">Publish the certificate to the DS Enterprise store with the following command:<br /><span class="userinput">certutil -dspublish -f YOUR_SAVED_CERT NTAuthCA</span></li></ol></li>
<li value="6">Upload the signed certificate to <span class="mc-variable okta-feature-names.ScaleFT variable">Advanced Server Access</span>.<ol style="list-style-type: lower-alpha;"><li value="1">Return to the <span class="uicontrol">Passwordless Certificates</span> tab in <span class="mc-variable okta-feature-names.ScaleFT variable">Advanced Server Access</span> dashboard.</li><li value="2">Identify the created certificate record.</li><li value="3">Click <img src="../img/icon-gear.png" alt="gear icon" /> &gt; <span class="uicontrol">Upload certificate</span>.</li><li value="4">In the Upload Certificate window, click <span class="uicontrol">Browse files</span>.</li><li value="5">In the file explorer window, locate the issued certificate file.</li><li value="6">In the Upload Certificate window, click <span class="uicontrol">Upload</span>.</li></ol></li>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -314,10 +314,10 @@ <h1>Delete a certificate</h1>
<ol>
<li value="1">Open the <span class="mc-variable okta-feature-names.ScaleFT variable">Advanced Server Access</span> dashboard.</li>
<li value="2">In the user menu, click <span class="uicontrol">Team Settings</span>.</li>
<li value="3">Go to the <span class="uicontrol">Passwordless Certificates</span> tab.&#160;</li>
<li value="3">Go to the <span class="uicontrol">Passwordless Certificates</span> tab. </li>
<li value="4">Identify the created certificate record.</li>
<li value="5">Click <img src="../img/icon-gear.png" alt="gear icon." /> &gt; <span class="uicontrol">Delete</span>.</li>
<li value="6">In the confirmation window, click <span class="uicontrol">Delete</span>.&#160;</li>
<li value="6">In the confirmation window, click <span class="uicontrol">Delete</span>. </li>
</ol>
</div>
</div>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -315,7 +315,7 @@ <h3>Start the task</h3>
<ol>
<li value="1">Open the <span class="mc-variable okta-feature-names.ScaleFT variable">Advanced Server Access</span> dashboard.</li>
<li value="2">In the user menu, click <span class="uicontrol">Team Settings</span>.</li>
<li value="3">Go to the <span class="uicontrol">Passwordless Certificates</span> tab.&#160;</li>
<li value="3">Go to the <span class="uicontrol">Passwordless Certificates</span> tab. </li>
<li value="4">Clone an existing record.
<ol style="list-style-type: lower-alpha;"><li value="1">Identify the expiring certificate.</li><li value="2">Click <img src="../img/icon-gear.png" alt="gear icon" /> &gt; <span class="uicontrol">Clone</span>.</li><li value="3">In the <span class="uicontrol">Create Certificate Signing Request</span> window, enter a new name.</li><li value="4">Click <span class="uicontrol">Create Certificate Signing Request</span>.</li></ol></li>
<li value="5">Create a certificate. See <a href="ad-certs-csr.htm" class="MCXref xref">Create a certificate using a certificate signing request</a>.</li>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -313,7 +313,7 @@ <h1>Create a self-signed certificate</h1>
<p><span class="mc-variable okta-feature-names.ScaleFT variable">Advanced Server Access</span> can generate self-signed certificates that contain information needed connect to an Active Directory (AD) domain. Teams must publish these certificates and add them to an AD auth store. Some of the following steps may differ depending on the specific AD environment.</p>
<p>Self-signed certificates are generally viewed as insecure. <span class="mc-variable okta-variables.ProductName variable">Okta</span> doesn’t recommend using self-signed certificates outside of testing environments.</p>
<ol>
<li value="1">Create a self-signed certificate in <span class="mc-variable okta-feature-names.ScaleFT variable">Advanced Server Access</span>.<ol style="list-style-type: lower-alpha;"><li value="1">Open the <span class="mc-variable okta-feature-names.ScaleFT variable">Advanced Server Access</span> dashboard.</li><li value="2">From the user menu, click <span class="uicontrol">Team Settings</span>.</li><li value="3">Go to the <span class="uicontrol">Passwordless Certificates</span> tab.&#160;</li><li value="4">Click <span class="uicontrol">Create</span> &gt; <span class="uicontrol">Self-Signed Certificate</span>.</li><li value="5">In the <span class="wintitle">Create Self-Signed Certificate</span> window, configure the certificate settings.</li><li value="6">Click <span class="uicontrol">Create Certificate</span>.<br />The certificate is downloaded to your local device. You must move this file to an AD domain controller.</li></ol></li>
<li value="1">Create a self-signed certificate in <span class="mc-variable okta-feature-names.ScaleFT variable">Advanced Server Access</span>.<ol style="list-style-type: lower-alpha;"><li value="1">Open the <span class="mc-variable okta-feature-names.ScaleFT variable">Advanced Server Access</span> dashboard.</li><li value="2">From the user menu, click <span class="uicontrol">Team Settings</span>.</li><li value="3">Go to the <span class="uicontrol">Passwordless Certificates</span> tab. </li><li value="4">Click <span class="uicontrol">Create</span> &gt; <span class="uicontrol">Self-Signed Certificate</span>.</li><li value="5">In the <span class="wintitle">Create Self-Signed Certificate</span> window, configure the certificate settings.</li><li value="6">Click <span class="uicontrol">Create Certificate</span>.<br />The certificate is downloaded to your local device. You must move this file to an AD domain controller.</li></ol></li>
<li value="2">Import the certificate into the AD auth store.<br />Note: You must adjust the following commands to use the name of your self-signed certificate.<ol style="list-style-type: lower-alpha;"><li value="1">In a command prompt, navigate to the directory where you stored the self-signed certificate.</li><li value="2">Publish the certificate with the following command:<br /><span class="userinput">certutil -dspublish -f YOUR_SELF_SIGNED_CERT NTAuthCA</span><br /></li><li value="3">Add the certificate into the registry with the following command:<br /><span class="userinput">certutil -enterprise -addstore NTAuth YOUR_SELF_SIGNED_CERT</span></li></ol></li>
</ol>
<p>After the certificate is imported into AD, teams must still distribute the certificate to domain controllers and member servers using a group policy.</p>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -317,7 +317,7 @@ <h2>Requirements</h2>
<li>Domain controllers must have a valid certificate bound to the KDC Service that is trusted by member servers. The certificate type bound to the KDC service must be <span class="wintitle">Domain Controller</span>, <span class="wintitle">Domain Controller Authentication</span>, or <span class="wintitle">Kerberos Authentication</span>.</li>
<li>A gateway able to resolve AD domain DNS and forward RDP connections</li>
<li>A device running the <span class="mc-variable okta-feature-names.ScaleFT variable">Advanced Server Access</span> client (v1.59.0 or later)</li>
<li>A device running a supported RDP&#160;client<ul><li><a href="https://dist.scaleft.com/freerdp/mac/" target="_blank">MacFreeRDP</a> (v2.4.0 only)</li><li>RoyalTSX</li><li>Windows Desktop RDP client</li></ul></li>
<li>A device running a supported RDP client<ul><li><a href="https://dist.scaleft.com/freerdp/mac/" target="_blank">MacFreeRDP</a> (v2.4.0 only)</li><li>RoyalTSX</li><li>Windows Desktop RDP client</li></ul></li>
</ul>
<div class="noteOkta">
<p class="noteContent"><span class="mc-variable okta-feature-names.ScaleFT variable">Advanced Server Access</span> doesn’t currently support connections to discovered servers from other RDP clients.</p>
Expand Down
Loading