@@ -47,14 +47,14 @@ To connect to an asset, first you need to establish the application authenticati
47
47
48
48
``` azurecli
49
49
# Append my-server.der OPC UA server certificate to the trusted certificate list secret as a new entry
50
- az iot ops connector opcua trust add --instance $INSTANCE_NAME --resource-group $RESOURCE_GROUP --certificate-file "./my-server.der"
50
+ az iot ops connector opcua trust add --instance <your instance name> --resource-group <your resource group> --certificate-file "./my-server.der"
51
51
```
52
52
53
53
For a PEM encoded certificate in a file such as *./my-server.crt*, run the following command:
54
54
55
55
```azurecli
56
56
# Append my-server.crt OPC UA server certificate to the trusted certificate list secret as a new entry
57
- az iot ops connector opcua trust add --instance $INSTANCE_NAME --resource-group $RESOURCE_GROUP --certificate-file "./my-server.crt"
57
+ az iot ops connector opcua trust add --instance <your instance name> --resource-group <your resource group> --certificate-file "./my-server.crt"
58
58
```
59
59
60
60
If your OPC UA server uses a certificate issued by a certificate authority (CA), you can trust the CA by adding its public key certificate to the connector for OPC UA trusted certificates list. The connector for OPC UA now automatically trusts all the servers that use a valid certificate issued by the CA. Therefore, you don't need to explicitly add the OPC UA server's certificate to the connector for OPC UA trusted certificates list.
@@ -71,7 +71,7 @@ To trust a CA, complete the following steps:
71
71
72
72
```bash
73
73
# Append CA certificate to the trusted certificate list secret as a new entry
74
- az iot ops connector opcua trust add --instance $INSTANCE_NAME --resource-group $RESOURCE_GROUP --certificate-file "./my-server-ca.der"
74
+ az iot ops connector opcua trust add --instance <your instance name> --resource-group <your resource group> --certificate-file "./my-server-ca.der"
75
75
76
76
# Append the CRL to the trusted certificate list secret as a new entry
77
77
data=$(kubectl create secret generic temp --from-file= my-server-ca.crl=./ my-server-ca.crl --dry-run=client -o jsonpath='{.data}')
@@ -82,7 +82,7 @@ To trust a CA, complete the following steps:
82
82
83
83
```bash
84
84
# Append CA certificate to the trusted certificate list secret as a new entry
85
- az iot ops connector opcua trust add --instance $INSTANCE_NAME --resource-group $RESOURCE_GROUP --certificate-file "./my-server-ca.crt"
85
+ az iot ops connector opcua trust add --instance <your instance name> --resource-group <your resource group> --certificate-file "./my-server-ca.crt"
86
86
87
87
# Append the CRL to the trusted certificates list secret as a new entry
88
88
data=$(kubectl create secret generic temp --from-file=my-server-ca.crl=./my-server-ca.crl --dry-run=client -o jsonpath='{.data}')
@@ -95,7 +95,7 @@ To trust a CA, complete the following steps:
95
95
96
96
```powershell
97
97
# Append CA certificate to the trusted certificate list secret as a new entry
98
- az iot ops connector opcua trust add --instance $INSTANCE_NAME --resource-group $RESOURCE_GROUP --certificate-file "./my-server-ca.der"
98
+ az iot ops connector opcua trust add --instance <your instance name> --resource-group <your resource group> --certificate-file "./my-server-ca.der"
99
99
100
100
# Append the CRL to the trusted certificate list secret as a new entry
101
101
$data = kubectl create secret generic temp --from-file=my-server-ca.crl=./my-server-ca.crl --dry-run=client -o jsonpath='{.data}'
@@ -106,7 +106,7 @@ To trust a CA, complete the following steps:
106
106
107
107
```powershell
108
108
# Append CA certificate to the trusted certificate list secret as a new entry
109
- az iot ops connector opcua trust add --instance $INSTANCE_NAME --resource-group $RESOURCE_GROUP --certificate-file "./my-server-ca.crt"
109
+ az iot ops connector opcua trust add --instance <your instance name> --resource-group <your resource group> --certificate-file "./my-server-ca.crt"
110
110
111
111
# Append the CRL to the trusted certificate list secret as a new entry
112
112
$data = kubectl create secret generic temp --from-file=my-server-ca.crl=./my-server-ca.crl --dry-run=client -o jsonpath='{.data}'
@@ -127,20 +127,20 @@ If your OPC UA server uses a certificate issued by a CA, but you don't want to t
127
127
128
128
```azurecli
129
129
# Append CA certificate to the issuer list secret as a new entry
130
- az iot ops connector opcua issuer add --instance $INSTANCE_NAME --resource-group $RESOURCE_GROUP --certificate-file "./my-server-ca.der"
130
+ az iot ops connector opcua issuer add --instance <your instance name> --resource-group <your resource group> --certificate-file "./my-server-ca.der"
131
131
132
132
# Append the CRL to the issuer list secret as a new entry
133
- az iot ops connector opcua issuer add --instance $INSTANCE_NAME --resource-group $RESOURCE_GROUP --certificate-file "./my-server-ca.crl"
133
+ az iot ops connector opcua issuer add --instance <your instance name> --resource-group <your resource group> --certificate-file "./my-server-ca.crl"
134
134
```
135
135
136
136
For a PEM encoded certificate in a file such as *./my-server-ca.crt*, run the following commands:
137
137
138
138
```azurecli
139
139
# Append CA certificate to the issuer list secret as a new entry
140
- az iot ops connector opcua issuer add --instance $INSTANCE_NAME --resource-group $RESOURCE_GROUP --certificate-file "./my-server-ca.crt"
140
+ az iot ops connector opcua issuer add --instance <your instance name> --resource-group <your resource group> --certificate-file "./my-server-ca.crt"
141
141
142
142
# Append the CRL to the issuer list secret as a new entry
143
- az iot ops connector opcua issuer add --instance $INSTANCE_NAME --resource-group $RESOURCE_GROUP --certificate-file "./my-server-ca.crl"
143
+ az iot ops connector opcua issuer add --instance <your instance name> --resource-group <your resource group> --certificate-file "./my-server-ca.crl"
144
144
```
145
145
146
146
## Configure your OPC UA server
@@ -197,8 +197,8 @@ Like the previous examples, you use a dedicated Kubernetes secret to store the c
197
197
# Upload OPC UA public key certificate as an entry to the secret
198
198
# Upload OPC UA private key certificate as an entry to the secret
199
199
az iot ops connector opcua client add \
200
- --instance $INSTANCE_NAME \
201
- -g $RESOURCE_GROUP \
200
+ --instance <your instance name> \
201
+ -g <your resource group> \
202
202
--public-key-file "./opcuabroker-certificate.der" \
203
203
--private-key-file "./opcuabroker-certificate.pem" \
204
204
--subject-name <subject name from the public key cert> \
@@ -212,8 +212,8 @@ Like the previous examples, you use a dedicated Kubernetes secret to store the c
212
212
# Upload OPC UA public key certificate as an entry to the secret
213
213
# Upload OPC UA private key certificate as an entry to the secret
214
214
az iot ops connector opcua client add `
215
- --instance $INSTANCE_NAME `
216
- -g $RESOURCE_GROUP `
215
+ --instance <your instance name> `
216
+ -g <your resource group> `
217
217
--public-key-file "./opcuabroker-certificate.der" `
218
218
--private-key-file "./opcuabroker-certificate.pem" `
219
219
--subject-name <subject name from the public key cert> `
@@ -226,10 +226,10 @@ Like the previous examples, you use a dedicated Kubernetes secret to store the c
226
226
227
227
```azurecli
228
228
# Append CA certificate to the issuer list secret as a new entry
229
- az iot ops connector opcua issuer add --instance $INSTANCE_NAME --resource-group $RESOURCE_GROUP --certificate-file "./enterprise-grade-ca-1.der"
229
+ az iot ops connector opcua issuer add --instance <your instance name> --resource-group <your resource group> --certificate-file "./enterprise-grade-ca-1.der"
230
230
231
231
# Append the CRL to the issuer list secret as a new entry
232
- az iot ops connector opcua issuer add --instance $INSTANCE_NAME --resource-group $RESOURCE_GROUP --certificate-file "./enterprise-grade-ca-1.crl"
232
+ az iot ops connector opcua issuer add --instance <your instance name> --resource-group <your resource group> --certificate-file "./enterprise-grade-ca-1.crl"
233
233
```
234
234
235
235
Now that the connector for OPC UA uses the enterprise certificate, don't forget to add the new certificate's public key to the trusted certificate lists of all OPC UA servers it needs to connect to.
0 commit comments