Skip to content

Commit 4103924

Browse files
committed
Incorp, round 2
1 parent acf0c7c commit 4103924

File tree

4 files changed

+8
-8
lines changed

4 files changed

+8
-8
lines changed

articles/iot-hub/iot-hub-x509-certificate-concepts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@ Digital signing can be used to determine whether the data has been modified in t
117117

118118
## Next steps
119119

120-
To learn more about the fields that make up an X.509 certificate, see [Tutorial: Understand X.509 public key certificates](tutorial-x509-certificates.md).
120+
To learn more about the fields that make up an X.509 certificate, see [Understand X.509 public key certificates](tutorial-x509-certificates.md).
121121

122122
If you're already familiar with X.509 certificates, and you want to generate test versions that you can use to authenticate to your IoT hub, see the following articles:
123123

articles/iot-hub/tutorial-x509-certificates.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Tutorial - Understand X.509 public key certificates for Azure IoT Hub| Microsoft Docs
3-
description: Tutorial - Understand X.509 public key certificates for Azure IoT Hub
2+
title: Understand X.509 public key certificates for Azure IoT Hub| Microsoft Docs
3+
description: Understand X.509 public key certificates for Azure IoT Hub
44
author: kgremban
55

66
ms.service: iot-hub
@@ -12,7 +12,7 @@ ms.custom: [mvc, 'Role: Cloud Development', 'Role: Data Analytics']
1212
#Customer intent: As a developer, I want to be able to use X.509 certificates to authenticate devices to an IoT hub. This step of the tutorial needs to introduce me to X.509 Public Key certificates.
1313
---
1414

15-
# Tutorial: Understand X.509 public key certificates
15+
# Understand X.509 public key certificates
1616

1717
X.509 certificates are digital documents that represent a user, computer, service, or device. They're issued by a certification authority (CA), subordinate CA, or registration authority and contain the public key of the certificate subject. They don't contain the subject's private key, which must be stored securely. Public key certificates are documented by [RFC 5280](https://tools.ietf.org/html/rfc5280). They're digitally signed and, in general, contain the following information:
1818

articles/iot-hub/tutorial-x509-introduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ Before starting any of the articles in this tutorial, you should be familiar wit
3333

3434
- For an introduction to concepts that underlie the use of X.509 certificates, see [Understand public key cryptography and X.509 public key infrastructure](iot-hub-x509-certificate-concepts.md).
3535

36-
- For a quick review of the fields that can be present in an X.509 certificate, see the [Certificate fields](tutorial-x509-certificates.md#certificate-fields) section of [Tutorial: Understand X.509 public key certificates](tutorial-x509-certificates.md).
36+
- For a quick review of the fields that can be present in an X.509 certificate, see the [Certificate fields](tutorial-x509-certificates.md#certificate-fields) section of [Understand X.509 public key certificates](tutorial-x509-certificates.md).
3737

3838
## X.509 certificate scenario paths
3939

@@ -49,7 +49,7 @@ Using a CA-signed certificate chain backed by a PKI to authenticate a device pro
4949

5050
## Next steps
5151

52-
To learn more about the fields that make up an X.509 certificate, see [Tutorial: Understand X.509 public key certificates](tutorial-x509-certificates.md).
52+
To learn more about the fields that make up an X.509 certificate, see [Understand X.509 public key certificates](tutorial-x509-certificates.md).
5353

5454
If you're already familiar with X.509 certificates, and you want to generate test versions that you can use to authenticate to your IoT hub, see the following articles:
5555

articles/iot-hub/tutorial-x509-prove-possession.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ When you upload your root certificate authority (CA) certificate or subordinate
2727

2828
1. To automatically verify the certificate, check the box next to **Set certificate status to verified on upload**.
2929

30-
:::image type="content" source="media/tutorial-x509-prove-possession/skip-pop.png" alt-text="Screenshot showing how to automatically verify the certificate status on upload.":::
30+
:::image type="content" source="media/tutorial-x509-prove-possession/skip-pop.png" alt-text="Screenshot showing how to automatically verify the certificate status on upload.":::
3131

3232
1. Select **Save**.
3333

@@ -41,7 +41,7 @@ If you didn't choose to automatically verify your certificate during upload, you
4141

4242
1. Select **Generate Verification Code** in the dialog.
4343

44-
:::image type="content" source="media/tutorial-x509-prove-possession/certificate-details.png" alt-text="Screenshot showing the certificate details dialog.":::
44+
:::image type="content" source="media/tutorial-x509-prove-possession/certificate-details.png" alt-text="Screenshot showing the certificate details dialog.":::
4545

4646
1. Copy the verification code to the clipboard. You must use this verification code as the certificate subject in subsequent steps. For example, if the verification code is 75B86466DA34D2B04C0C4C9557A119687ADAE7D4732BDDB3, add that as the subject of your certificate as shown in the next step.
4747

0 commit comments

Comments
 (0)