Skip to content

Commit 0346407

Browse files
committed
minor typo
1 parent 09a6a59 commit 0346407

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/defender-for-iot/organizations/how-to-deploy-certificates.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ This article describes how to create and deploy SSL/TLS certificates on OT netwo
1414
- Between an on-premises management console and a high availability (HA) server, if configured
1515
- Between OT sensors or on-premises management consoles and partners servers defined in [alert forwarding rules](how-to-forward-alert-information-to-partners.md)
1616

17-
SSL/TLS certificates can be deployed during initial configuration as well later on.
17+
You can deploy SSL/TLS certificates during initial configuration as well as later on.
1818

19-
Certificates are validated against a passphrase, if available, and the certificate expiration date. Invalid certificates can't be uploaded to OT sensors or on-premises management consoles, and will block encrypted communication between Defender for IoT components.
19+
Certificates are validated against the certificate expiration date and against a passphrase, if available. Invalid certificates can't be uploaded to OT sensors or on-premises management consoles, and will block encrypted communication between Defender for IoT components.
2020

2121
Each certificate authority (CA)-signed certificate must have both a `.key` file and a `.crt` file, which are uploaded to OT network sensors and on-premises management consoles after the first sign-in. While some organizations may also require a `.pem` file, a `.pem` file isn't required for Defender for IoT.
2222

0 commit comments

Comments
 (0)