You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-deploy-certificates.md
+38-36Lines changed: 38 additions & 36 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,21 +11,21 @@ This article provides information needed when creating and deploying certificate
11
11
12
12
Defender for IoT uses SSL/TLS certificates to secure communication between the following system components:
13
13
14
-
- Between users and the web console of the appliance.
15
-
- Between the sensors and an on-premises management console.
14
+
- Between users and the web console of the appliance.
15
+
- Between the sensors and an on-premises management console.
16
16
- Between a management console and a High Availability management console.
17
-
- To the REST API on the sensor and on-premises management console.
17
+
- To the REST API on the sensor and on-premises management console.
18
18
19
19
Defender for IoT Admin users can upload a certificate to sensor consoles and their on-premises management console from the SSL/TLS Certificates dialog box.
20
20
21
-
:::image type="content" source="media/how-to-activate-and-set-up-your-sensor/wizard-upload-activation-certificates-1.png" alt-text="Screenshot of an initial sensor signin certificate page.":::
21
+
:::image type="content" source="media/how-to-activate-and-set-up-your-sensor/wizard-upload-activation-certificates-1.png" alt-text="Screenshot of an initial sensor sign-in certificate page.":::
22
22
23
23
## About certificate generation methods
24
24
25
25
All certificate generation methods are supported using:
26
26
27
-
- Private and Enterprise Key Infrastructures (Private PKI)
28
-
- Public Key Infrastructures (Public PKI)
27
+
- Private and Enterprise Key Infrastructures (Private PKI).
28
+
- Public Key Infrastructures (Public PKI).
29
29
- Certificates locally generated on the appliance (locally self-signed).
30
30
31
31
> [!Important]
@@ -52,58 +52,58 @@ Validation is carried out twice:
52
52
53
53
If validation fails, communication between the relevant components is halted and a validation error is presented in the console.
54
54
55
-
## About certificate upload to Defender for IoT
55
+
## About certificate upload to Defender for IoT appliances
56
56
57
57
Following sensor and on-premises management console installation, a local self-signed certificate is generated and used to access the sensor and on-premises management console web application.
58
58
59
59
When signing into the sensor and on-premises management console for the first time, Admin users are prompted to upload an SSL/TLS certificate. Using SSL/TLS certificates is highly recommended.
60
60
61
61
If the certificate isn't created properly by the certificate lead or there are connection issues to it, the certificate can't be uploaded and users will be forced to work with a locally signed certificate.
62
62
63
-
The option to validate the uploaded certificate and third-party certificates is automatically enabled, but can be disabled. When disabled, encrypted communications between components continues, even if a certificate is invalid.
63
+
The option to validate the uploaded certificate and third-party certificates is automatically enabled, but can be disabled. When disabled, encrypted communications between components continue, even if a certificate is invalid.
64
64
65
-
## Certificate deployment tasks
65
+
## Certificate deployment
66
66
67
67
This section describes the steps you need to take to ensure that certificate deployment runs smoothly.
68
68
69
69
**To deploy certificates, verify that:**
70
70
71
71
- A security, PKI or certificate specialist is creating or overseeing certificate creation.
72
72
- You create a unique certificate for each sensor, management console and HA machine.
73
-
- You meet certificate creation requirements. See [Certificate creation requirements](#certificate-creation-requirements).
73
+
- You meet[certificate creation requirements](#supported-ssl-certificates).
74
74
- Admin users logging in to each Defender for IoT sensor, and on-premises management console and HA machine have access to the certificate.
75
75
76
-
## Certificate creation requirements
76
+
## Supported SSL certificates
77
77
78
-
This section covers certificate creation requirement, including:
78
+
This section covers requirements for successful certificate deployment, including:
79
79
80
-
-[Port access requirements for certificate validation](#port-access-requirements-for-certificate-validation)
80
+
-[CRL server access for certificate validation](#crl-server-access-for-certificate-validation)
81
81
82
-
-[File type requirements](#file-type-requirements)
-[Certificate chain file requirements (if .pem is used)](#certificate-chain-file-requirements-if-pem-is-used)
86
+
-[Using a certificate chain (optional)](#using-a-certificate-chain-optional)
87
87
88
-
### Port access requirements for certificate validation
88
+
### CRL server access for certificate validation
89
89
90
90
If you are working with certificate validation, verify access to port 80 is available.
91
91
92
-
Certificate validation is evaluated against a Certificate Revocation List, and the certificate expiration date. This means appliance should be able to establish connection to the CRL server defined by the certificate. By default, the certificate will reference the CRL URL on HTTP port 80.
92
+
Certificate validation is evaluated against a Certificate Revocation List, and the certificate expiration date. This means the appliance should be able to establish connection to the CRL server defined by the certificate. By default, the certificate will reference the CRL URL on HTTP port 80.
93
93
94
94
Some organizational security policies may block access to this port. If your organization doesn't have access to port 80, you can:
95
95
96
96
1. Define another URL and a specific port in the certificate.
97
97
98
-
- The URL should be defined as http: // rather than https: //.
98
+
- The URL should be defined as `http: //` rather than `https: //`.
99
99
100
100
- Verify that the destination CRL server can listen on the port you defined.
101
101
102
102
1. Use a proxy server that will access the CRL on port 80.
103
103
104
-
### File type requirements
104
+
### Supported certificate file types
105
105
106
-
Defender for IoT requires that each CA-signed certificate contains a .key file and a .crt file. These files are uploaded to the sensor and On-premises management console after login. Some organizations may require .pem file. Defender for IoT doesn't require this file type.
106
+
Defender for IoT requires that each CA-signed certificate contains a .key file and a .crt file. These files are uploaded to the sensor and On-premises management console after login. Some organizations may require a .pem file. Defender for IoT doesn't require this file type.
107
107
108
108
**.crt – certificate container file**
109
109
@@ -125,7 +125,7 @@ Verify that you've met the following parameter requirements before creating a ce
125
125
126
126
-[CRT file requirements](#crt-file-requirements)
127
127
-[Key file requirements](#key-file-requirements)
128
-
-[Certificate chain file requirements (if .pem is used)](#certificate-chain-file-requirements-if-pem-is-used)
128
+
-[Using a certificate chain (optional)](#using-a-certificate-chain-optional)
129
129
130
130
### CRT file requirements
131
131
@@ -142,41 +142,43 @@ This section covers .crt field requirements.
142
142
- Subject (OU) Org Unit = defined, for example, Contoso Labs
143
143
- Subject (O)rganization = defined, for example, Contoso Inc.
144
144
145
-
Certificates with other parameters might work, but Microsoft doesn't support them.
145
+
> [!IMPORTANT]
146
+
> Certificates with other parameters might work, but Microsoft doesn't support them.
147
+
> Wildcard SSL certificates (public key certificates that can be used on multiple subdomains such as *.contoso.com) are not supported and insecure. Each appliance should use a unique CN.
146
148
147
149
### Key file requirements
148
150
149
151
Use either RSA 2048 bits or 4096 bits.
150
152
151
-
When using a key length of 4096 bits, the SSL handshake at the start of each connection will be slower. in addition, there is an increase in CPU usage during handshakes.
153
+
When using a key length of 4096 bits, the SSL handshake at the start of each connection will be slower. In addition, there's an increase in CPU usage during handshakes.
152
154
153
-
### Certificate chain file requirements (if .pem is used)
155
+
### Using a certificate chain (optional)
154
156
155
157
A .pem file containing the certificates of all the certificate authorities in the chain of trust that led to your certificate.
156
158
157
159
Bag attributes are supported in the certificate chain file.
158
160
159
-
## Create certificates
161
+
## Create SSL certificates
160
162
161
-
Use a certificate management platform to create a certificate, for example, an automated PKI management platform. Verify that the certificates meet certificate file requirements. See Test certificates for information on testing the files you create.
163
+
Use a certificate management platform to create a certificate, for example, an automated PKI management platform. Verify that the certificates meet certificate file requirements. For more information on testing the files you create, see [Test certificates you create](#test-certificates-you-create).
162
164
163
165
If you are not carrying out certificate validation, remove the CRL URL reference in the certificate. See [CRT file requirements](#crt-file-requirements) for information about this parameter.
164
166
165
-
Consult a security, PKI, or other qualified certificate lead if you do not have an application that can automatically create certificates.
167
+
Consult a security, PKI, or other qualified certificate lead if you don't have an application that can automatically create certificates.
166
168
167
169
You can [Test certificates you create](#test-certificates-you-create).
168
170
169
-
You can also convert existing certificate files if you do not want to create new ones. See [Convert existing files to supported files](#convert-existing-files-to-supported-files) for details.
171
+
You can also convert existing certificate files if you don't want to create new ones. See [Convert existing files to supported files](#convert-existing-files-to-supported-files) for details.
170
172
171
173
### Sample Certificate
172
174
173
-
You can compare your certificate to the sample certificate below. Verify that the same fields exits and that the order of the fields is the same.
175
+
Compare your certificate to the following sample certificate. Verify that the same fields exits and that the order of the fields is the same:
174
176
175
177
:::image type="content" source="media/how-to-deploy-certificates/sample-certificate.png" alt-text="Screenshot of a sample certificate.":::
176
178
177
179
## Test certificates you create
178
180
179
-
You can test certificates before deploying them to your sensors and on-premises management consoles. If you want to check the information within the certificate .csr file or private key file, use these commands:
181
+
Test certificates before deploying them to your sensors and on-premises management consoles. If you want to check the information within the certificate .csr file or private key file, use these commands:
180
182
181
183
|**Test**|**CLI command**|
182
184
|--|--|
@@ -203,15 +205,15 @@ This section covers various issues that may occur during certificate upload and
203
205
204
206
### Troubleshoot CA-Certificate Upload
205
207
206
-
Admin users attempting to log in to the sensor or on-premises management console for the first time will not be able to upload the CA-signed certificate if the certificate is not created properly or is invalid. If certificate upload fails, one or several of the error messages will display:
208
+
Admin users attempting to log in to the sensor or on-premises management console for the first time will not be able to upload the CA-signed certificate if the certificate isn't created properly or is invalid. If certificate upload fails, one or several of the error messages will display:
| Passphrase does not match to the key | Validate that you typed the correct passphrase. If the problem continues, try recreating the certificate using the correct passphrase. |
211
-
| Cannot validate chain of trust. The provided Certificate and Root CA do not match. | Make sure the .pem file correlates to the .crt file. If the problem continues, try recreating the certificate using the correct chain of trust (defined by the .pem file). |
212
-
| This SSL certificate has expired and is not considered valid. | Create a new certificate with valid dates.|
213
-
| This SSL certificate has expired and is not considered valid. | Create a new certificate with valid dates.|
214
-
|This certificate has been revoked by the CRL and cannot be trusted for a secure connection | Create a new unrevoked certificate. |
213
+
| Cannot validate chain of trust. The provided Certificate and Root CA don't match. | Make sure the .pem file correlates to the .crt file. If the problem continues, try recreating the certificate using the correct chain of trust (defined by the .pem file). |
214
+
| This SSL certificate has expired and isn't considered valid. | Create a new certificate with valid dates.|
215
+
| This SSL certificate has expired and isn't considered valid. | Create a new certificate with valid dates.|
216
+
|This certificate has been revoked by the CRL and can't be trusted for a secure connection | Create a new unrevoked certificate. |
215
217
|The CRL (Certificate Revocation List) location is not reachable. Verify the URL can be accessed from this appliance | Make sure that your network configuration allows the appliance to reach the CRL Server defined in the certificate. You can use a proxy server if there are limitations in establishing a direct connection.
216
218
|Certificate validation failed | This indicates a general error in the appliance. Contact [Microsoft Support](https://support.microsoft.com/supportforbusiness/productselection?sapId=82c8f35-1b8e-f274-ec11-c6efdd6dd099).|
217
219
@@ -222,7 +224,7 @@ Your file conversion may not create a valid certificate. For example, the file s
222
224
If the conversion fails:
223
225
224
226
- Use the conversion commands described in [Convert existing files to supported files](#convert-existing-files-to-supported-files).
225
-
- Make sure the file parameters are accurate. See, [File type requirements](#file-type-requirements) and[Certificate File Parameter Requirements](#certificate-file-parameter-requirements) for details.
227
+
- Make sure the file parameters are accurate. See[Supported certificate file types](#supported-certificate-file-types) and [Certificate File Parameter Requirements](#certificate-file-parameter-requirements) for details.
0 commit comments