Skip to content

Commit 15ff16d

Browse files
committed
acrolinx
1 parent bc95f02 commit 15ff16d

File tree

3 files changed

+13
-13
lines changed

3 files changed

+13
-13
lines changed

articles/iot-dps/about-iot-dps.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -28,11 +28,11 @@ Before the device provisioning flow begins, there are two manual steps to prepar
2828

2929
Once the device and cloud are set up for provisioning, the following steps kick off automatically as soon as the device powers on for the first time:
3030

31-
1. When the device first powers on, it connects to the DPS endpoint and presents it authentication credentials.
31+
1. The device powers on for the first time, then connects to the DPS endpoint and presents it authentication credentials.
3232
1. The DPS instance checks the identity of the device against its enrollment list. Once the device identity is verified, DPS assigns the device to an IoT hub and registers it in the hub.
3333
1. The DPS instance receives the device ID and registration information from the assigned hub and passes that information back to the device.
3434
1. The device uses its registration information to connect directly to its assigned IoT hub and authenticate.
35-
1. Once authenticated, the device and IoT hub begin communicating directly. The DPS instance has no further role as an intermediary unless the device needs to reprovision.
35+
1. The device and IoT hub begin communicating directly. The DPS instance has no further role as an intermediary unless the device needs to reprovision.
3636

3737
## When to use Device Provisioning Service
3838

@@ -46,11 +46,11 @@ There are many provisioning scenarios in which DPS is an excellent choice for ge
4646
* Reprovisioning based on a change in the device
4747
* Rolling the keys used by the device to connect to IoT Hub (when not using X.509 certificates to connect)
4848

49-
Provisioning of nested IoT Edge devices (parent/child hierarchies) is not currently supported by DPS.
49+
Provisioning of nested IoT Edge devices (parent/child hierarchies) isn't currently supported by DPS.
5050

5151
## Prepare for provisioning
5252

53-
There are two distinct steps in the deployment process of a device that will provision with DPS:
53+
There are two steps that take place ahead of a device provisioning with DPS:
5454

5555
* The **manufacturing step** in which the device is created and prepared at the factory, and
5656
* The **cloud setup step** in which the Device Provisioning Service is configured for automated provisioning.
@@ -61,17 +61,17 @@ Both of these steps can be incorporated into existing manufacturing and deployme
6161

6262
This step is all about what happens on the manufacturing line. The roles involved in this step include silicon designer, silicon manufacturer, integrator and/or the end manufacturer of the device. This step is concerned with creating the hardware itself.
6363

64-
DPS doesn't introduce a new step in the manufacturing process; rather, it ties into the existing step that installs the initial software and (ideally) the HSM on the device. Instead of creating a device ID in this step, the device is programmed with the provisioning service information, enabling it to call the provisioning service to get its connection info/IoT solution assignment when it's switched on.
64+
DPS doesn't introduce a new step in the manufacturing process; rather, it ties into the existing step that installs the initial software and (ideally) the hardware security module (HSM) on the device. Instead of creating a device ID in this step, the device is programmed with the provisioning service information, enabling it to call the provisioning service to get its connection info/IoT solution assignment when it's switched on.
6565

66-
Also in this step, the manufacturer supplies the device deployer/operator with identifying key information. Supplying that information could be as simple as confirming that all devices have an X.509 certificate generated from a signing certificate provided by the device deployer/operator, or as complicated as extracting the public portion of a TPM endorsement key from each TPM device. These services are offered by many silicon manufacturers today.
66+
Also in this step, the manufacturer supplies the device deployer/operator with identifying key information. Supplying that information could be as simple as confirming that all devices have an X.509 certificate generated from a signing certificate provided by the device deployer/operator, or as complicated as extracting the public portion of a TPM endorsement key from each TPM device. Many silicon manufacturers offer these services.
6767

6868
### Cloud setup step
6969

7070
This step is about configuring the cloud for proper automatic provisioning. Generally there are two types of users involved in the cloud setup step: someone who knows how devices need to be initially set up (a device operator), and someone else who knows how devices are to be split among the IoT hubs (a solution operator).
7171

72-
There's a one-time initial setup of the provisioning service, which is usually handled by the solution operator. Once the provisioning service is configured, it doesn't have to be modified unless the use case changes.
72+
There's a one-time initial setup of the provisioning service, which the solution operator usually handles. Once the provisioning service is configured, it doesn't have to be modified unless the use case changes.
7373

74-
After the service has been configured for automatic provisioning, it must be prepared to enroll devices. This step is done by the device operator, who knows the desired configuration of the devices and is in charge of making sure the provisioning service can properly attest to a device's identity when it looks for its IoT hub. The device operator takes the identifying key information from the manufacturer and adds it to the enrollment list. There can be subsequent updates to the enrollment list as new entries are added or existing entries are updated with the latest information about the devices.
74+
After the service is configured for automatic provisioning, it must be prepared to enroll devices. This step is done by the device operator, who knows the desired configuration of the devices and makes sure that the provisioning service can properly attest to a device's identity. The device operator takes the identifying key information from the manufacturer and adds it to the enrollment list. There can be subsequent updates to the enrollment list as new entries are added or existing entries are updated with the latest information about the devices.
7575

7676
## Registration and provisioning
7777

@@ -118,13 +118,13 @@ For resiliency and reliability, we recommend deploying to one of the regions tha
118118

119119
Device Provisioning Service stores customer data. By default, customer data is replicated to a secondary region to support disaster recovery scenarios. For deployments in Southeast Asia and Brazil South, customers can choose to keep their data only within that region by [disabling disaster recovery](./iot-dps-ha-dr.md). For more information, see [Cross-region replication in Azure](../availability-zones/cross-region-replication-azure.md).
120120

121-
DPS uses the same [device provisioning endpoint](concepts-service.md#device-provisioning-endpoint) for all provisioning service instances, and performs traffic load balancing to the nearest available service endpoint. As a result, authentication secrets may be temporarily transferred outside of the region where the DPS instance was initially created. However, once the device is connected, the device data flows directly to the original region of the DPS instance. To ensure that your data doesn't leave the original or secondary region, use a private endpoint. To learn how to set up private endpoints, see [DPS support for virtual networks](virtual-network-support.md#private-endpoint-limitations).
121+
DPS uses the same [device provisioning endpoint](concepts-service.md#device-provisioning-endpoint) for all provisioning service instances, and performs traffic load balancing to the nearest available service endpoint. As a result, authentication secrets may be temporarily transferred outside of the region where the DPS instance was initially created. However, once the device is connected, the device data flows directly to the original region of the DPS instance. To ensure that your data doesn't leave the original or secondary region, use a private endpoint. To learn how to set up private endpoints, see [DPS support for virtual networks](virtual-network-support.md#private-endpoint-limitations).
122122

123123
## Quotas and Limits
124124

125-
Each Azure subscription has default quota limits in place that could impact the scope of your IoT solution. The current limit on a per-subscription basis is 10 Device Provisioning Services per subscription.
125+
Each Azure subscription has default quota limits in place that could impact the scope of your IoT solution. The current limit is 10 Device Provisioning Service instances per subscription.
126126

127-
For more details on quota limits, see [Azure Subscription Service Limits](../azure-resource-manager/management/azure-subscription-service-limits.md).
127+
For more information about quota limits, see [Azure Subscription Service Limits](../azure-resource-manager/management/azure-subscription-service-limits.md).
128128

129129
[!INCLUDE [azure-iotdps-limits](../../includes/iot-dps-limits.md)]
130130

articles/iot-dps/concepts-symmetric-key-attestation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ You can also provide your own symmetric keys for enrollments by disabling this o
2828

2929
Symmetric key attestation with the Device Provisioning Service is performed using the same [security tokens](../iot-hub/iot-hub-dev-guide-sas.md#sas-token-structure) supported by IoT hubs to identify devices. These security tokens are Shared Access Signature (SAS) tokens.
3030

31-
SAS tokens have a hashed *signature* that is created using the symmetric key. The Device Provisioning Service receates the signature to verify whether or not a security token presented during attestation is authentic.
31+
SAS tokens have a hashed *signature* that is created using the symmetric key. The Device Provisioning Service recreates the signature to verify whether or not a security token presented during attestation is authentic.
3232

3333
SAS tokens have the following form:
3434

articles/iot-dps/quick-create-simulated-device-x509.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -248,7 +248,7 @@ Perform the steps in this section in your Git Bash prompt.
248248

249249
The certificate file has its subject common name (CN) set to `my-x509-device`. For X.509-based enrollments, the [Registration ID](./concepts-service.md#registration-id) is set to the common name. The registration ID is a case-insensitive string of alphanumeric characters plus the special characters: `'-'`, `'.'`, `'_'`, `':'`. The last character must be alphanumeric or dash (`'-'`). The common name must adhere to this format. DPS supports registration IDs up to 128 characters long; however, the maximum length of the subject common name in an X.509 certificate is 64 characters. The registration ID, therefore, is limited to 64 characters when using X.509 certificates.
250250

251-
5. The certificate file is Base64 encoded. To view the subject common name (CN) and other properties of the certificate file, enter the following command:
251+
5. The certificate file is Base 64 encoded. To view the subject common name (CN) and other properties of the certificate file, enter the following command:
252252

253253
# [Windows](#tab/windows)
254254

0 commit comments

Comments
 (0)