You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-operations/discover-manage-assets/howto-configure-opcua-certificates-infrastructure.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,10 +41,10 @@ To connect to an OPC UA server, first you need to establish the application auth
41
41
42
42
To use the operations experience web UI to manage the trusted certificates list, complete the following steps:
43
43
44
-
1. Get the OPC UA server application's instance certificate as a file. These files typically have a .der or .crt extension. This file contains the public key only.
44
+
1. Get the OPC UA server application's instance certificate as a file. These files typically have a `.der` or `.crt` extension. This file contains the public key only.
45
45
46
46
> [!TIP]
47
-
> Typically, an OPC UA server has an interface that lets you export its application instance certificate. This interface isn't standardized. For servers such as KEPServerEx, there's a Windows-based configuration UI for certificates management. Other servers might have a web interface or use operating system folders to store the certificates. To find out how to export the application instance certificate, refer to the user manual of your server. After you have the certificate, make sure it's either DER or PEM encoded. Typically stored in files with either the .der or .crt extension. If the certificate isn't in one of those file formats, use a tool such as `openssl` to transform the certificate into the required format.
47
+
> Typically, an OPC UA server has an interface that lets you export its application instance certificate. This interface isn't standardized. For servers such as KEPServerEx, there's a Windows-based configuration UI for certificates management. Other servers might have a web interface or use operating system folders to store the certificates. To find out how to export the application instance certificate, refer to the user manual of your server. After you have the certificate, make sure it's either DER or PEM encoded. These certificates are typically stored in files with either the `.der` or `.crt` extension. If the certificate isn't in one of those file formats, use a tool such as `openssl` to transform the certificate into the required format.
48
48
49
49
1. You can add the certificate directly to your Azure Key Vault as a secret and import from there, or you can upload the certificate to the trusted certificates list using the operations experience.
50
50
@@ -75,10 +75,10 @@ If your OPC UA server uses a certificate issued by a certificate authority (CA),
75
75
76
76
To use the Azure CLI to manage the trusted certificates list, complete the following steps:
77
77
78
-
1. Get the OPC UA server application's instance certificate as a file. These files typically have a .der or .crt extension. This file contains the public key only.
78
+
1. Get the OPC UA server application's instance certificate as a file. These files typically have a `.der` or `.crt` extension. This file contains the public key only.
79
79
80
80
> [!TIP]
81
-
> Typically, an OPC UA server has an interface that lets you export its application instance certificate. This interface isn't standardized. For servers such as KEPServerEx, there's a Windows-based configuration UI for certificates management. Other servers might have a web interface or use operating system folders to store the certificates. To find out how to export the application instance certificate, refer to the user manual of your server. After you have the certificate, make sure it's either DER or PEM encoded. Typically stored in files with either the .der or .crt extension. If the certificate isn't in one of those file formats, use a tool such as `openssl` to transform the certificate into the required format.
81
+
> Typically, an OPC UA server has an interface that lets you export its application instance certificate. This interface isn't standardized. For servers such as KEPServerEx, there's a Windows-based configuration UI for certificates management. Other servers might have a web interface or use operating system folders to store the certificates. To find out how to export the application instance certificate, refer to the user manual of your server. After you have the certificate, make sure it's either DER or PEM encoded. These certificates are typically stored in files with either the `.der` or `.crt` extension. If the certificate isn't in one of those file formats, use a tool such as `openssl` to transform the certificate into the required format.
82
82
83
83
1. Add the OPC UA server's application instance certificate to the trusted certificates list. This list is implemented as a Kubernetes native secret named *aio-opc-ua-broker-trust-list* that's created when you deploy Azure IoT Operations.
84
84
@@ -100,7 +100,7 @@ If your OPC UA server uses a certificate issued by a certificate authority (CA),
100
100
101
101
To trust a CA, complete the following steps:
102
102
103
-
1. Get the CA certificate public key encode in DER or PEM format. These certificates are typically stored in files with either the .der or .crt extension. Get the CA's CRL. This list is typically in a file with the .crl. Check the documentation for your OPC UA server for details.
103
+
1. Get the CA certificate public key encode in DER or PEM format. These certificates are typically stored in files with either the `.der` or `.crt` extension. Get the CA's CRL. This list is typically in a file with the .crl. Check the documentation for your OPC UA server for details.
104
104
105
105
1. Save the CA certificate and the CRL in the *aio-opc-ua-broker-trust-list* Kubernetes native secret:
106
106
@@ -156,7 +156,7 @@ Before you can configure the issuer certificates list with your intermediate cer
156
156
157
157
To use the operations experience web UI to manage the issuer certificates list, complete the following steps:
158
158
159
-
1. Get the issuer certificate that was used to sign your server instance certificates as a file. These files typically have a .der or .crt extension. This file contains the public key only. You might also have a .crl file (certificate revocation list) for the issuer certificate.
159
+
1. Get the issuer certificate that was used to sign your server instance certificates as a file. These files typically have a `.der` or `.crt` extension. This file contains the public key only. You might also have a .crl file (certificate revocation list) for the issuer certificate.
160
160
161
161
1. You can add the issuer certificate directly to your Azure Key Vault as a secret and import from there, or you can upload the certificate and certificate revocation list (.crl file) to the issuer certificates list using the operations experience.
162
162
@@ -189,7 +189,7 @@ Before you can configure the issuer certificates list with your intermediate cer
189
189
190
190
To use the Azure CLI to manage the issuer certificates list, complete the following steps:
191
191
192
-
1. Save the CA certificate and the CRL in the `aio-opc-ua-broker-issuer-list` secret:
192
+
- Save the CA certificate and the CRL in the `aio-opc-ua-broker-issuer-list` secret:
193
193
194
194
```azurecli
195
195
# Append CA certificate to the issuer list secret as a new entry
Copy file name to clipboardExpand all lines: articles/iot-operations/end-to-end-tutorials/tutorial-add-assets.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -80,7 +80,7 @@ Before the OPC PLC simulator can send data to the connector for OPC UA, you need
80
80
81
81
### Add the connector's certificate to the simulator's trust list
82
82
83
-
Each OPC UA server has it's own mechanism for managing the trust list. To add the connector's certificate to the simulator's trust list, run the following commands:
83
+
Each OPC UA server has its own mechanism for managing the trust list. To add the connector's certificate to the simulator's trust list, run the following commands:
### Add the simulator's certificate to the connector's trust list
98
98
99
-
Every OPC UA server type has it's own mechanism for managing its application instance certificate. To download the simulator's certificate to a file called `opcplc-000000.crt`, run the following command:
99
+
Every OPC UA server type has its own mechanism for managing its application instance certificate. To download the simulator's certificate to a file called `opcplc-000000.crt`, run the following command:
To add the simulator's certificate to the connector's trust list:
106
106
107
-
- Go to the [operations experience](https://iotoperations.azure.com) web UI and sign in with your Microsoft Entra ID credentials.
107
+
1. Go to the [operations experience](https://iotoperations.azure.com) web UI and sign in with your Microsoft Entra ID credentials.
108
108
109
-
- Select your site. If you're working with a new deployment, there are no sites yet. You can find the cluster you created in the previously by selecting **View unassigned instances**. In the operations experience, an instance represents a cluster where you deployed Azure IoT Operations.
109
+
1. Select your site. If you're working with a new deployment, there are no sites yet. You can find the cluster you created in the previously by selecting **View unassigned instances**. In the operations experience, an instance represents a cluster where you deployed Azure IoT Operations.
110
110
111
111
:::image type="content" source="media/tutorial-add-assets/site-list.png" lightbox="media/tutorial-add-assets/site-list.png" alt-text="Screenshot that shows the unassigned instances node in the operations experience.":::
112
112
113
-
- Select the instance where you deployed Azure IoT Operations:
113
+
1. Select the instance where you deployed Azure IoT Operations:
> If you don't see any instances, you might not be in the right Microsoft Entra ID tenant. You can change the tenant from the top right menu in the operations experience.
119
119
120
-
- Select **Asset endpoints**~ and then **Manage certificates and secrets**:
120
+
1. Select **Asset endpoints** and then **Manage certificates and secrets**:
121
121
122
122
:::image type="content" source="media/tutorial-add-assets/manage-certificates.png" lightbox="media/tutorial-add-assets/manage-certificates.png" alt-text="Screenshot that shows how to find the manage certificates page in the operations experience.":::
123
123
124
-
- On the **Certificates page**, select **Trust list** and then **Add new certificate**:
124
+
1. On the **Certificates page**, select **Trust list** and then **Add new certificate**:
125
125
126
126
:::image type="content" source="media/tutorial-add-assets/add-certificate.png" lightbox="media/tutorial-add-assets/add-certificate.png" alt-text="Screenshot that shows how to add a certificate to the trust list in the operations experience.":::
127
127
128
-
- Select **Upload certificate** and choose the `opcplc-000000.crt` file you downloaded previously. Then select **Upload**:
128
+
1. Select **Upload certificate** and choose the `opcplc-000000.crt` file you downloaded previously. Then select **Upload**:
129
129
130
130
:::image type="content" source="media/tutorial-add-assets/uploaded-certificate.png" lightbox="media/tutorial-add-assets/uploaded-certificate.png" alt-text="Screenshot that shows a successful certificate upload.":::
131
131
132
-
- Select **Apply**.
132
+
1. Select **Apply**.
133
133
134
134
The simulator's application instance certificate is now in the connector for OPC UA's trust list.
135
135
136
136
## Add an asset endpoint
137
137
138
-
In this step, you use the operations experience to add an asset endpoint that enables you to connect to the OPC PLC simulator.To add an asset endpoint:
138
+
In this step, you use the operations experience to add an asset endpoint that enables you to connect to the OPC PLC simulator.To add an asset endpoint:
139
139
140
140
1. Select **Asset endpoints** and then **Create asset endpoint**:
Copy file name to clipboardExpand all lines: articles/iot-operations/secure-iot-ops/howto-manage-secrets.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ Secrets management for Azure IoT Operations uses Secret Store extension to sync
31
31
32
32
Once the [set up secrets management](../deploy-iot-ops/howto-enable-secure-settings.md#set-up-secrets-management) steps are completed, you can start adding secrets to Azure Key Vault, and sync them to the Kubernetes cluster to be used in **Asset Endpoints** or **Data flow Endpoints** using the [operations experience](https://iotoperations.azure.com) web UI.
33
33
34
-
Secrets are used in asset endpoints and data flow endpoints for authentication. In this section, we use asset endpoints as an example, the same can be applied to data flow endpoints. You have the option to directly create the secret in Azure Key Vault and have it automatically synchronized down to the cluster, or use an existing secret reference from the key vault:
34
+
Secrets are used in asset endpoints and data flow endpoints for authentication. This section uses asset endpoints as an example. The same process can be applied to data flow endpoints. You have the option to directly create the secret in Azure Key Vault and have it automatically synchronized down to the cluster, or use an existing secret reference from the key vault:
35
35
36
36
1. Go to the **Asset endpoints** page in the [operations experience](https://iotoperations.azure.com) web UI.
37
37
@@ -49,7 +49,7 @@ Secrets are used in asset endpoints and data flow endpoints for authentication.
49
49
50
50
## Manage synced secrets
51
51
52
-
In this section, we use asset endpoints as an example, the same can be applied to data flow endpoints:
52
+
This section uses asset endpoints as an example. The same process can be applied to data flow endpoints:
53
53
54
54
1. Go to the **Asset endpoints** page in the [operations experience](https://iotoperations.azure.com) web UI.
0 commit comments