From eb7c3fc8009bdd2eb3c9699951a5b77185d1c346 Mon Sep 17 00:00:00 2001 From: Nicole Rappe Date: Wed, 16 Jul 2025 02:20:28 -0600 Subject: [PATCH] Update Workflows/Windows/Windows Server/Roles/Active Directory Certificate Services.md --- .../Roles/Active Directory Certificate Services.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Workflows/Windows/Windows Server/Roles/Active Directory Certificate Services.md b/Workflows/Windows/Windows Server/Roles/Active Directory Certificate Services.md index bcd87a9..ff83428 100644 --- a/Workflows/Windows/Windows Server/Roles/Active Directory Certificate Services.md +++ b/Workflows/Windows/Windows Server/Roles/Active Directory Certificate Services.md @@ -78,7 +78,7 @@ You will see a finalization screen confirming everything we have configured, it Now that we have set up the root certificate authority, we can focus on setting up the subordinate CA. !!! warning "Enterprise Admin Requirement" - When you are setting up the role, you **absolutely** have to use an Enterprise Admin account. This could be a service account like `svcCertAdmin` or something similar. + When you are setting up the role, you **absolutely** have to use an "*Enterprise*" Admin account. This could be a service account like `svcCertAdmin` or something similar. - Navigate to "**Server Manager > (Alert Flag) > Post-deployment Configuration: Active Directory Certificate Services**" - Under credentials, enter the username for an Enterprise Admin. (e.g. `BUNNY-LAB\nicole.rappe`)