Skip to content

Commit 39cbac7

Browse files
authored
Merge pull request #176253 from v-gpettibone/sscert
Updated article for low KPI numbers
2 parents 3fcd744 + 55d4cfa commit 39cbac7

File tree

1 file changed

+6
-5
lines changed

1 file changed

+6
-5
lines changed

articles/iot-hub/tutorial-x509-self-sign.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,10 +14,7 @@ ms.custom: [mvc, 'Role: Cloud Development', 'Role: Data Analytics']
1414

1515
# Tutorial: Using OpenSSL to create self-signed certificates
1616

17-
You can authenticate a device to your IoT Hub using two self-signed device certificates. This is sometimes called thumbprint authentication because the certificates contain thumbprints (hash values) that you submit to the IoT hub. The following steps tell you how to create two self-signed certificates.
18-
19-
> [!NOTE]
20-
> This example was created using Cygwin64 for Windows. Cygwin is an open source tool collection that allows Unix or Linux applications to be run on Windows from within a Linux-like interface. CygWin64 is bundled with OpenSSL. If you are using Linux, you probably already have OpenSSL installed.
17+
You can authenticate a device to your IoT Hub using two self-signed device certificates. This is sometimes called thumbprint authentication because the certificates contain thumbprints (hash values) that you submit to the IoT hub. The following steps tell you how to create two self-signed certificates. This type of certificate is mainly used for testing.
2118

2219
## Step 1 - Create a key for the first certificate
2320

@@ -105,4 +102,8 @@ Navigate to your IoT Hub in the Azure portal and create a new IoT device identit
105102

106103
## Next Steps
107104

108-
Go to [Testing Certificate Authentication](tutorial-x509-test-certificate.md) to determine if your certificate can authenticate your device to your IoT Hub.
105+
Go to [Testing Certificate Authentication](tutorial-x509-test-certificate.md) to determine if your certificate can authenticate your device to your IoT Hub. The code on that page requires that you use a PFX certificate. Use the following OpenSSL command to convert your device .crt certificate to .pfx format.
106+
107+
```bash
108+
openssl pkcs12 -export -in device.crt -inkey device.key -out device.pfx
109+
```

0 commit comments

Comments
 (0)