Skip to content

Commit 0c87ece

Browse files
committed
Fix redirects
1 parent 67385cc commit 0c87ece

File tree

3 files changed

+7
-7
lines changed

3 files changed

+7
-7
lines changed

articles/iot-operations/.openpublishing.redirection.iot-operations.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -477,13 +477,13 @@
477477
},
478478
{
479479
"source_path_from_root": "/articles/iot-operations/manage-mqtt-broker/concept-default-root-ca.md",
480-
"redirect_url": "/azure/iot-operations/secure-iot-ops/concept-default-root-ca",
480+
"redirect_url": "/azure/iot-operations/secure-iot-ops/howto-manage-certificates",
481481
"redirect_document_id": false
482482
},
483483
{
484484
"source_path_from_root": "/articles/iot-operations/deploy-iot-ops/concept-default-root-ca.md",
485-
"redirect_url": "/azure/iot-operations/secure-iot-ops/concept-default-root-ca",
486-
"redirect_document_id": true
485+
"redirect_url": "/azure/iot-operations/secure-iot-ops/howto-manage-certificates",
486+
"redirect_document_id": false
487487
},
488488
{
489489
"source_path_from_root": "/articles/iot-operations/get-started-end-to-end-sample/quickstart-add-assets.md",
@@ -551,7 +551,7 @@
551551
"redirect_document_id": false
552552
},
553553
{
554-
"source_path": "articles/iot-operations/secure-iot-ops/concept-default-root-ca.md",
554+
"source_path_from_root": "/articles/iot-operations/secure-iot-ops/concept-default-root-ca.md",
555555
"redirect_url": "/azure/iot-operations/secure-iot-ops/howto-manage-certificates",
556556
"redirect_document_id": true
557557
}

articles/iot-operations/deploy-iot-ops/howto-deploy-iot-operations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,7 @@ Use these steps if you chose the **Test settings** option on the **Dependency ma
140140
1. Prepare the cluster for Azure IoT Operations deployment. Copy and run the provided [az iot ops init](/cli/azure/iot/ops#az-iot-ops-init) command.
141141
142142
>[!TIP]
143-
>The `init` command only needs to be run once per cluster. If you followed the optional prerequisite to set up your own certificate authority issuer, follow the steps in [Bring your own issuer](../secure-iot-ops/concept-default-root-ca.md#bring-your-own-issuer).
143+
>The `init` command only needs to be run once per cluster. If you followed the optional prerequisite to set up your own certificate authority issuer, follow the steps in [Bring your own issuer](../secure-iot-ops/howto-manage-certificates.md#bring-your-own-issuer).
144144
145145
This command might take several minutes to complete. You can watch the progress in the deployment progress display in the terminal.
146146

articles/iot/iot-overview-security.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ You can divide security in an edge-based IoT solution into the following four ar
3131

3232
- **Cloud security**: Secure your data while it moves through, and is stored in the cloud.
3333

34-
Typically on an edge-based solution, you want to secure your end-to-end operations by using Azure security capabilities. Azure IoT Operations has built-in security capabilities such as [secrets management](../iot-operations/secure-iot-ops/howto-manage-secrets.md), [certificate management](../iot-operations/secure-iot-ops/concept-default-root-ca.md), and [secure settings](../iot-operations/deploy-iot-ops/howto-enable-secure-settings.md) on an [Azure Arc-enabled Kubernetes](/azure/azure-arc/kubernetes/overview) cluster. When a Kubernetes cluster is connected to Azure, an outbound connection to Azure is initiated, using industry-standard SSL to secure data in transit, and several other security features are enabled, such as:
34+
Typically on an edge-based solution, you want to secure your end-to-end operations by using Azure security capabilities. Azure IoT Operations has built-in security capabilities such as [secrets management](../iot-operations/secure-iot-ops/howto-manage-secrets.md), [certificate management](../iot-operations/secure-iot-ops/howto-manage-certificates.md), and [secure settings](../iot-operations/deploy-iot-ops/howto-enable-secure-settings.md) on an [Azure Arc-enabled Kubernetes](/azure/azure-arc/kubernetes/overview) cluster. When a Kubernetes cluster is connected to Azure, an outbound connection to Azure is initiated, using industry-standard SSL to secure data in transit, and several other security features are enabled, such as:
3535

3636
- View and monitor your clusters using [Azure Monitor for containers](/azure/azure-monitor/containers/kubernetes-monitoring-enable).
3737
- Enforce threat protection using [Microsoft Defender for Containers](/azure/defender-for-cloud/defender-for-containers-introduction).
@@ -51,7 +51,7 @@ Both Defender for IoT and Defender for Containers can automatically monitor some
5151

5252
- **Secrets management**: Use [Azure Key Vault](/azure/key-vault/general/overview) to store and manage asset's sensitive information such as keys, passwords, certificates, and secrets. Azure IoT Operations uses Azure Key Vault as the managed vault solution on the cloud, and uses [Azure Key Vault Secret Store extension for Kubernetes](/azure/azure-arc/kubernetes/secret-store-extension) to sync the secrets down from the cloud and store them on the edge as Kubernetes secrets. To learn more, see [Manage secrets for your Azure IoT Operations deployment](../iot-operations/secure-iot-ops/howto-manage-secrets.md).
5353

54-
- **Certificate management**: Managing certificates is crucial for ensuring secure communication between assets and your edge runtime environment. Azure IoT Operations provides tools for managing certificates, including issuing, renewing, and revoking certificates. To learn more, see [Certificate management for Azure IoT Operations internal communication](../iot-operations/secure-iot-ops/concept-default-root-ca.md).
54+
- **Certificate management**: Managing certificates is crucial for ensuring secure communication between assets and your edge runtime environment. Azure IoT Operations provides tools for managing certificates, including issuing, renewing, and revoking certificates. To learn more, see [Certificate management for Azure IoT Operations internal communication](../iot-operations/secure-iot-ops/howto-manage-certificates.md).
5555

5656
- **Select tamper-proof hardware for assets**: Choose asset hardware with built-in mechanisms to detect physical tampering, such as the opening of the device cover or the removal of a part of the device. These tamper signals can be part of the data stream uploaded to the cloud, alerting operators to these events.
5757

0 commit comments

Comments
 (0)