Skip to content

Commit 07f4e51

Browse files
authored
Address feedback
1 parent cd1f019 commit 07f4e51

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/iot-edge/how-to-create-test-certificates.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -151,7 +151,7 @@ If you want multiple root CA certificates, be sure to manage them in separate fo
151151

152152
This script command creates several certificate and key files, but when articles ask for the **root CA certificate**, use the following file:
153153

154-
`certs\azure-iot-test-only.root.ca.cert.pem`\
154+
`certs\azure-iot-test-only.root.ca.cert.pem`
155155

156156
# [Linux](#tab/linux)
157157

@@ -230,7 +230,7 @@ Then, follow these instructions depending on your method for provisioning:
230230
<!--1.1-->
231231
:::moniker range="iotedge-2018-06"
232232
233-
Every IoT Edge device going to production needs a CA signing certificate that's referenced from the config file. This certificate is known as the **device CA certificate**. The device CA certificate is responsible for creating certificates for modules running on the device. It's also necessary for gateway scenarios, because the device CA certificate is how the IoT Edge device verifies its identity to downstream devices. To learn more, see [Understand how Azure IoT Edge uses certificates](iot-edge-certs.md)
233+
Every IoT Edge device going to production needs a CA signing certificate that's referenced from the config file. This certificate is known as the **device CA certificate**. The device CA certificate is responsible for creating certificates for modules running on the device. It's also necessary for gateway scenarios, because the device CA certificate is how the IoT Edge device verifies its identity to downstream devices. To learn more, see [Understand how Azure IoT Edge uses certificates](iot-edge-certs.md).
234234
235235
Device CA certificates go in the **Certificate** section of the config.yaml file on the IoT Edge device.
236236
@@ -284,7 +284,7 @@ If you're setting up a downstream IoT device for a gateway scenario and want to
284284
If you want to use symmetric key authentication, you don't need to create additional certificates for the downstream device.
285285

286286
There are two ways to authenticate an IoT device using X.509 certificates: using self-signed certs or using certificate authority (CA) signed certs.
287-
- For X.509 self-signed authentication, sometimes referred to as *thumbprint* authentication, you need to create new certificates to place on your IoT device.These certificates have a thumbprint in them that you share with IoT Hub for authentication.
287+
- For X.509 self-signed authentication, sometimes referred to as *thumbprint* authentication, you need to create new certificates to place on your IoT device. These certificates have a thumbprint in them that you share with IoT Hub for authentication.
288288
- For X.509 certificate authority (CA) signed authentication, you need a root CA certificate registered in IoT Hub that you use to sign certificates for your IoT device. Any device using a certificate that was issued by the root CA certificate or any of its intermediate certificates can authenticate.
289289

290290
The certificate generation scripts can help you make demo certificates to test out either of these authentication scenarios.
@@ -367,7 +367,7 @@ The certificates in this section are for the steps in the IoT Hub X.509 certific
367367

368368
1. Upload the root CA certificate file from your working directory, `certs\azure-iot-test-only.root.ca.cert.pem`, to your IoT hub.
369369

370-
2. If automatically verfication isn't selected, use the code provided in the Azure portal to verify that you own that root CA certificate.
370+
2. If automatic verfication isn't selected, use the code provided in the Azure portal to verify that you own that root CA certificate.
371371

372372
```PowerShell
373373
New-CACertsVerificationCert "<verification code>"
@@ -390,7 +390,7 @@ The certificates in this section are for the steps in the IoT Hub X.509 certific
390390

391391
1. Upload the root CA certificate file from your working directory, `certs\azure-iot-test-only.root.ca.cert.pem`, to your IoT hub.
392392

393-
2. If automatically verfication isn't selected, use the code provided in the Azure portal to verify that you own that root CA certificate.
393+
2. If automatic verfication isn't selected, use the code provided in the Azure portal to verify that you own that root CA certificate.
394394

395395
```bash
396396
./certGen.sh create_verification_certificate "<verification code>"

0 commit comments

Comments
 (0)