You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-edge/how-to-create-test-certificates.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -151,7 +151,7 @@ If you want multiple root CA certificates, be sure to manage them in separate fo
151
151
152
152
This script command creates several certificate and key files, but when articles ask for the **root CA certificate**, use the following file:
153
153
154
-
`certs\azure-iot-test-only.root.ca.cert.pem`\
154
+
`certs\azure-iot-test-only.root.ca.cert.pem`
155
155
156
156
# [Linux](#tab/linux)
157
157
@@ -230,7 +230,7 @@ Then, follow these instructions depending on your method for provisioning:
230
230
<!--1.1-->
231
231
:::moniker range="iotedge-2018-06"
232
232
233
-
Every IoT Edge device going to production needs a CA signing certificate that's referenced from the config file. This certificate is known as the **device CA certificate**. The device CA certificate is responsible for creating certificates for modules running on the device. It's also necessary for gateway scenarios, because the device CA certificate is how the IoT Edge device verifies its identity to downstream devices. To learn more, see [Understand how Azure IoT Edge uses certificates](iot-edge-certs.md)
233
+
Every IoT Edge device going to production needs a CA signing certificate that's referenced from the config file. This certificate is known as the **device CA certificate**. The device CA certificate is responsible for creating certificates for modules running on the device. It's also necessary for gateway scenarios, because the device CA certificate is how the IoT Edge device verifies its identity to downstream devices. To learn more, see [Understand how Azure IoT Edge uses certificates](iot-edge-certs.md).
234
234
235
235
Device CA certificates go in the **Certificate** section of the config.yaml file on the IoT Edge device.
236
236
@@ -284,7 +284,7 @@ If you're setting up a downstream IoT device for a gateway scenario and want to
284
284
If you want to use symmetric key authentication, you don't need to create additional certificates for the downstream device.
285
285
286
286
There are two ways to authenticate an IoT device using X.509 certificates: using self-signed certs or using certificate authority (CA) signed certs.
287
-
- For X.509 self-signed authentication, sometimes referred to as *thumbprint* authentication, you need to create new certificates to place on your IoT device.These certificates have a thumbprint in them that you share with IoT Hub for authentication.
287
+
- For X.509 self-signed authentication, sometimes referred to as *thumbprint* authentication, you need to create new certificates to place on your IoT device.These certificates have a thumbprint in them that you share with IoT Hub for authentication.
288
288
- For X.509 certificate authority (CA) signed authentication, you need a root CA certificate registered in IoT Hub that you use to sign certificates for your IoT device. Any device using a certificate that was issued by the root CA certificate or any of its intermediate certificates can authenticate.
289
289
290
290
The certificate generation scripts can help you make demo certificates to test out either of these authentication scenarios.
@@ -367,7 +367,7 @@ The certificates in this section are for the steps in the IoT Hub X.509 certific
367
367
368
368
1. Upload the root CA certificate file from your working directory, `certs\azure-iot-test-only.root.ca.cert.pem`, to your IoT hub.
369
369
370
-
2. If automatically verfication isn't selected, use the code provided in the Azure portal to verify that you own that root CA certificate.
370
+
2. If automatic verfication isn't selected, use the code provided in the Azure portal to verify that you own that root CA certificate.
371
371
372
372
```PowerShell
373
373
New-CACertsVerificationCert "<verification code>"
@@ -390,7 +390,7 @@ The certificates in this section are for the steps in the IoT Hub X.509 certific
390
390
391
391
1. Upload the root CA certificate file from your working directory, `certs\azure-iot-test-only.root.ca.cert.pem`, to your IoT hub.
392
392
393
-
2. If automatically verfication isn't selected, use the code provided in the Azure portal to verify that you own that root CA certificate.
393
+
2. If automatic verfication isn't selected, use the code provided in the Azure portal to verify that you own that root CA certificate.
0 commit comments