You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-deploy-certificates.md
+74-12Lines changed: 74 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,9 @@ This article describes how to create and deploy SSL/TLS certificates on OT netwo
14
14
- Between an on-premises management console and a high availability (HA) server, if configured
15
15
- Between OT sensors or on-premises management consoles and partners servers defined in [alert forwarding rules](how-to-forward-alert-information-to-partners.md)
16
16
17
-
Some organizations also validate their certificates against a Certificate Revocation List (CRL) and the certificate expiration date, and the certificate trust chain. Invalid certificates can't be uploaded to OT sensors or on-premises management consoles, and will block encrypted communication between Defender for IoT components.
17
+
You can deploy SSL/TLS certificates during initial configuration as well as later on.
18
+
19
+
Defender for IoT validates certificates against the certificate expiration date and against a passphrase, if one is defined. Validations against a Certificate Revocation List (CRL) and the certificate trust chain are available as well, though not mandatory. Invalid certificates can't be uploaded to OT sensors or on-premises management consoles, and will block encrypted communication between Defender for IoT components.
18
20
19
21
Each certificate authority (CA)-signed certificate must have both a `.key` file and a `.crt` file, which are uploaded to OT network sensors and on-premises management consoles after the first sign-in. While some organizations may also require a `.pem` file, a `.pem` file isn't required for Defender for IoT.
20
22
@@ -35,29 +37,89 @@ Deploy your SSL/TLS certificate by importing it to your OT sensor or on-premises
35
37
36
38
Verify that your SSL/TLS certificate [meets the required parameters](#verify-certificate-file-parameter-requirements), and that you have [access to a CRL server](#verify-crl-server-access).
37
39
38
-
### Import the SSL/TLS certificate
40
+
### Deploy a certificate on an OT sensor
41
+
42
+
1. Sign into your OT sensor and select **System settings** > **Basic** > **SSL/TLS certificate**.
43
+
44
+
1. In the **SSL/TLS certificate** pane, select one of the following, and then follow the instructions in the relevant tab:
45
+
46
+
-**Import a trusted CA certificate (recommended)**
Select **Use CRL (Certificate Revocation List) to check certificate status** to validate the certificate against a [CRL server](#verify-crl-server-access). The certificate is checked once during the import process.
41
62
42
-
1. Sign into your OT sensor and select **System settings** > **Basic** > **SSL/TLS certificate**
63
+
For example:
43
64
44
-
1. In the **SSL/TLS certificate** pane, enter your certificate name and passphrase, and then upload the files you'd created earlier.
65
+
:::image type="content" source="media/how-to-deploy-certificates/recommended-ssl.png" alt-text="Screenshot of importing a trusted CA certificate." lightbox="media/how-to-deploy-certificates/recommended-ssl.png":::
> Using self-signed certificates in a production environment is not recommended, as it leads to a less secure environment.
71
+
> We recommend using self-signed certificates in test environments only.
72
+
> The owner of the certificate cannot be validated and the security of your system cannot be maintained.
45
73
46
-
Select **Enable certificate validation** to validate the certificate against a [CRL server](#verify-crl-server-access).
74
+
Select **Confirm** to acknowledge the warning.
75
+
76
+
---
77
+
78
+
1. In the **Validation for on-premises management console certificates** area, select **Required** if SSL/TLS certificate validation is required. Otherwise, select **None**.
47
79
48
80
1. Select **Save** to save your certificate settings.
49
81
50
-
**To deploy a certificate on an on-premises management console sensor**:
82
+
### Deploy a certificate on an on-premises management console
51
83
52
-
1. Sign into your OT sensor and select **System settings** > **SSL/TLS certificates**.
84
+
1. Sign into your on-premises management console and select **System settings** > **SSL/TLS certificates**.
53
85
54
-
1. In the **SSL/TLS Certificates**dialog, select **Add Certificate**.
86
+
1. In the **SSL/TLS certificate**pane, select one of the following, and then follow the instructions in the relevant tab:
55
87
56
-
1. In the **Import a trusted CA-signed certificate** area, enter a certificate name and optional passphrase, and then upload the files you'd created earlier.
88
+
-**Import a trusted CA certificate**
89
+
-**Use Locally generated self-signed certificate (Insecure, not recommended)**
57
90
58
-
1. Select the **Enable certificate validation** option to validate the certificate against a [CRL server](#verify-crl-server-access).
91
+
# [Trusted CA certificates](#tab/cm-import-trusted-ca-certificate)
92
+
93
+
1. In the **SSL/TLS Certificates** dialog, select **Add Certificate**.
59
94
60
-
1. Select **Save** to save your certificate settings.
95
+
1. Enter the following parameters:
96
+
97
+
| Parameter | Description |
98
+
|---------|---------|
99
+
|**Certificate Name**| Enter your certificate name. |
100
+
|**Passphrase** - *Optional*| Enter a passphrase. |
:::image type="content" source="media/how-to-deploy-certificates/management-ssl-certificate.png" alt-text="Screenshot of importing a trusted CA certificate." lightbox="media/how-to-deploy-certificates/management-ssl-certificate.png":::
> Using self-signed certificates in a production environment is not recommended, as it leads to a less secure environment.
113
+
> We recommend using self-signed certificates in test environments only.
114
+
> The owner of the certificate cannot be validated and the security of your system cannot be maintained.
115
+
116
+
Select **I CONFIRM** to acknowledge the warning.
117
+
118
+
---
119
+
120
+
1. Select the **Enable Certificate Validation** option to turn on system-wide validation for SSL/TLS certificates with the issuing [Certificate Authority](#create-ca-signed-ssltls-certificates) and [Certificate Revocation Lists](#verify-crl-server-access).
121
+
122
+
1. Select **SAVE** to save your certificate settings.
61
123
62
124
You can also [import the certificate to your OT sensor using CLI commands](references-work-with-defender-for-iot-cli-commands.md#tlsssl-certificate-commands).
0 commit comments