Skip to content

Commit 19f8c3a

Browse files
authored
Merge pull request #229075 from Shereen-Bhar/Update-SSL-certificate-screenshots
update SSL certificate UI changes
2 parents 21a8dbd + b95cc38 commit 19f8c3a

File tree

3 files changed

+74
-12
lines changed

3 files changed

+74
-12
lines changed

articles/defender-for-iot/organizations/how-to-deploy-certificates.md

Lines changed: 74 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,9 @@ This article describes how to create and deploy SSL/TLS certificates on OT netwo
1414
- Between an on-premises management console and a high availability (HA) server, if configured
1515
- Between OT sensors or on-premises management consoles and partners servers defined in [alert forwarding rules](how-to-forward-alert-information-to-partners.md)
1616

17-
Some organizations also validate their certificates against a Certificate Revocation List (CRL) and the certificate expiration date, and the certificate trust chain. Invalid certificates can't be uploaded to OT sensors or on-premises management consoles, and will block encrypted communication between Defender for IoT components.
17+
You can deploy SSL/TLS certificates during initial configuration as well as later on.
18+
19+
Defender for IoT validates certificates against the certificate expiration date and against a passphrase, if one is defined. Validations against a Certificate Revocation List (CRL) and the certificate trust chain are available as well, though not mandatory. Invalid certificates can't be uploaded to OT sensors or on-premises management consoles, and will block encrypted communication between Defender for IoT components.
1820

1921
Each certificate authority (CA)-signed certificate must have both a `.key` file and a `.crt` file, which are uploaded to OT network sensors and on-premises management consoles after the first sign-in. While some organizations may also require a `.pem` file, a `.pem` file isn't required for Defender for IoT.
2022

@@ -35,29 +37,89 @@ Deploy your SSL/TLS certificate by importing it to your OT sensor or on-premises
3537

3638
Verify that your SSL/TLS certificate [meets the required parameters](#verify-certificate-file-parameter-requirements), and that you have [access to a CRL server](#verify-crl-server-access).
3739

38-
### Import the SSL/TLS certificate
40+
### Deploy a certificate on an OT sensor
41+
42+
1. Sign into your OT sensor and select **System settings** > **Basic** > **SSL/TLS certificate**.
43+
44+
1. In the **SSL/TLS certificate** pane, select one of the following, and then follow the instructions in the relevant tab:
45+
46+
- **Import a trusted CA certificate (recommended)**
47+
- **Use Locally generated self-signed certificate (Not recommended)**
3948

40-
**To deploy a certificate on an OT sensor**:
49+
# [Trusted CA certificates](#tab/import-trusted-ca-certificate)
50+
51+
1. Enter the following parameters:
52+
53+
| Parameter | Description |
54+
|---------|---------|
55+
| **Certificate Name** | Enter your certificate name. |
56+
| **Passphrase** - *Optional* | Enter a passphrase. |
57+
| **Private Key (KEY file)** | Upload a Private Key (KEY file). |
58+
| **Certificate (CRT file)** | Upload a Certificate (CRT file). |
59+
| **Certificate Chain (PEM file)** - *Optional* | Upload a Certificate Chain (PEM file). |
60+
61+
Select **Use CRL (Certificate Revocation List) to check certificate status** to validate the certificate against a [CRL server](#verify-crl-server-access). The certificate is checked once during the import process.
4162

42-
1. Sign into your OT sensor and select **System settings** > **Basic** > **SSL/TLS certificate**
63+
For example:
4364

44-
1. In the **SSL/TLS certificate** pane, enter your certificate name and passphrase, and then upload the files you'd created earlier.
65+
:::image type="content" source="media/how-to-deploy-certificates/recommended-ssl.png" alt-text="Screenshot of importing a trusted CA certificate." lightbox="media/how-to-deploy-certificates/recommended-ssl.png":::
66+
67+
# [Locally generated self-signed certificates](#tab/locally-generated-self-signed-certificate)
68+
69+
> [!NOTE]
70+
> Using self-signed certificates in a production environment is not recommended, as it leads to a less secure environment.
71+
> We recommend using self-signed certificates in test environments only.
72+
> The owner of the certificate cannot be validated and the security of your system cannot be maintained.
4573
46-
Select **Enable certificate validation** to validate the certificate against a [CRL server](#verify-crl-server-access).
74+
Select **Confirm** to acknowledge the warning.
75+
76+
---
77+
78+
1. In the **Validation for on-premises management console certificates** area, select **Required** if SSL/TLS certificate validation is required. Otherwise, select **None**.
4779

4880
1. Select **Save** to save your certificate settings.
4981

50-
**To deploy a certificate on an on-premises management console sensor**:
82+
### Deploy a certificate on an on-premises management console
5183

52-
1. Sign into your OT sensor and select **System settings** > **SSL/TLS certificates**.
84+
1. Sign into your on-premises management console and select **System settings** > **SSL/TLS certificates**.
5385

54-
1. In the **SSL/TLS Certificates** dialog, select **Add Certificate**.
86+
1. In the **SSL/TLS certificate** pane, select one of the following, and then follow the instructions in the relevant tab:
5587

56-
1. In the **Import a trusted CA-signed certificate** area, enter a certificate name and optional passphrase, and then upload the files you'd created earlier.
88+
- **Import a trusted CA certificate**
89+
- **Use Locally generated self-signed certificate (Insecure, not recommended)**
5790

58-
1. Select the **Enable certificate validation** option to validate the certificate against a [CRL server](#verify-crl-server-access).
91+
# [Trusted CA certificates](#tab/cm-import-trusted-ca-certificate)
92+
93+
1. In the **SSL/TLS Certificates** dialog, select **Add Certificate**.
5994

60-
1. Select **Save** to save your certificate settings.
95+
1. Enter the following parameters:
96+
97+
| Parameter | Description |
98+
|---------|---------|
99+
| **Certificate Name** | Enter your certificate name. |
100+
| **Passphrase** - *Optional* | Enter a passphrase. |
101+
| **Private Key (KEY file)** | Upload a Private Key (KEY file). |
102+
| **Certificate (CRT file)** | Upload a Certificate (CRT file). |
103+
| **Certificate Chain (PEM file)** - *Optional* | Upload a Certificate Chain (PEM file). |
104+
105+
For example:
106+
107+
:::image type="content" source="media/how-to-deploy-certificates/management-ssl-certificate.png" alt-text="Screenshot of importing a trusted CA certificate." lightbox="media/how-to-deploy-certificates/management-ssl-certificate.png":::
108+
109+
# [Locally generated self-signed certificates](#tab/cm-locally-generated-self-signed-certificate)
110+
111+
> [!NOTE]
112+
> Using self-signed certificates in a production environment is not recommended, as it leads to a less secure environment.
113+
> We recommend using self-signed certificates in test environments only.
114+
> The owner of the certificate cannot be validated and the security of your system cannot be maintained.
115+
116+
Select **I CONFIRM** to acknowledge the warning.
117+
118+
---
119+
120+
1. Select the **Enable Certificate Validation** option to turn on system-wide validation for SSL/TLS certificates with the issuing [Certificate Authority](#create-ca-signed-ssltls-certificates) and [Certificate Revocation Lists](#verify-crl-server-access).
121+
122+
1. Select **SAVE** to save your certificate settings.
61123

62124
You can also [import the certificate to your OT sensor using CLI commands](references-work-with-defender-for-iot-cli-commands.md#tlsssl-certificate-commands).
63125

177 KB
Loading
151 KB
Loading

0 commit comments

Comments
 (0)