Skip to content

Commit 3d1f383

Browse files
kgrembanCIPop
andauthored
Apply suggestions from code review
Co-authored-by: Cristian Pop <[email protected]>
1 parent 171c98d commit 3d1f383

File tree

5 files changed

+5
-5
lines changed

5 files changed

+5
-5
lines changed

articles/iot-hub/module-twins-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ This article shows you how to create an Azure CLI session in which you:
3939
You can use symmetric keys or X.509 certificates to authenticate module identities. For X.509 certificate authentication, the module's certificate *must* have its common name (CN) formatted like `CN=<deviceid>/<moduleid>`. For example:
4040

4141
```bash
42-
openssl req -new -key d1m1.key.pm -out d1m1.csr -subj "/CN=device01\/module01"
42+
openssl req -new -key d1m1.key.pem -out d1m1.csr -subj "/CN=device01\/module01"
4343
```
4444

4545
## Prepare the Cloud Shell

articles/iot-hub/module-twins-dotnet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ At the end of this article, you have two .NET console apps:
4040
You can use symmetric keys or X.509 certificates to authenticate module identities. For X.509 certificate authentication, the module's certificate *must* have its common name (CN) formatted like `CN=<deviceid>/<moduleid>`. For example:
4141

4242
```bash
43-
openssl req -new -key d1m1.key.pm -out d1m1.csr -subj "/CN=device01\/module01"
43+
openssl req -new -key d1m1.key.pem -out d1m1.csr -subj "/CN=device01\/module01"
4444
```
4545

4646
## Get the IoT hub connection string

articles/iot-hub/module-twins-node.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ At the end of this article, you have two Node.js apps:
4040
You can use symmetric keys or X.509 certificates to authenticate module identities. For X.509 certificate authentication, the module's certificate *must* have its common name (CN) formatted like `CN=<deviceid>/<moduleid>`. For example:
4141

4242
```bash
43-
openssl req -new -key d1m1.key.pm -out d1m1.csr -subj "/CN=device01\/module01"
43+
openssl req -new -key d1m1.key.pem -out d1m1.csr -subj "/CN=device01\/module01"
4444
```
4545

4646
## Get the IoT hub connection string

articles/iot-hub/module-twins-portal-dotnet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ In this article, you will learn how to:
4141
You can use symmetric keys or X.509 certificates to authenticate module identities. For X.509 certificate authentication, the module's certificate *must* have its common name (CN) formatted like `CN=<deviceid>/<moduleid>`. For example:
4242

4343
```bash
44-
openssl req -new -key d1m1.key.pm -out d1m1.csr -subj "/CN=device01\/module01"
44+
openssl req -new -key d1m1.key.pem -out d1m1.csr -subj "/CN=device01\/module01"
4545
```
4646

4747
## Create a module identity in the portal

articles/iot-hub/module-twins-python.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ At the end of this article, you have three Python apps:
4444
You can use symmetric keys or X.509 certificates to authenticate module identities. For X.509 certificate authentication, the module's certificate *must* have its common name (CN) formatted like `CN=<deviceid>/<moduleid>`. For example:
4545

4646
```bash
47-
openssl req -new -key d1m1.key.pm -out d1m1.csr -subj "/CN=device01\/module01"
47+
openssl req -new -key d1m1.key.pem -out d1m1.csr -subj "/CN=device01\/module01"
4848
```
4949

5050
## Get the IoT hub connection string

0 commit comments

Comments
 (0)