Skip to content

Commit 4eb019a

Browse files
Merge pull request #217544 from yoninalmsft/deploy-certificates
Title change deploy certificates
2 parents cc99231 + eea09b2 commit 4eb019a

File tree

2 files changed

+14
-14
lines changed

2 files changed

+14
-14
lines changed

articles/defender-for-iot/organizations/how-to-deploy-certificates.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
2-
title: Deploy certificates
2+
title: Setting SSL/TLS appliance certificates
33
description: Learn how to set up and deploy certificates for Defender for IoT.
44
ms.date: 02/06/2022
55
ms.topic: how-to
66
---
77

8-
# About certificates
8+
# Certificates for appliance encryption and authentication (OT appliances)
99

1010
This article provides information needed when creating and deploying certificates for Microsoft Defender for IoT. A security, PKI or other qualified certificate lead should handle certificate creation and deployment.
1111

@@ -43,12 +43,12 @@ Validation is evaluated against:
4343

4444
Validation is carried out twice:
4545

46-
1. When uploading the certificate to sensors and on-premises management consoles. If validation fails, the certificate cannot be uploaded.
46+
1. When uploading the certificate to sensors and on-premises management consoles. If validation fails, the certificate can't be uploaded.
4747
1. When initiating encrypted communication between:
4848

4949
- Defender for IoT system components, for example, a sensor and on-premises management console.
5050

51-
- Defender for IoT and certain 3rd party servers defined in Forwarding rules. See [About forwarded alert information](how-to-forward-alert-information-to-partners.md#about-forwarded-alert-information) for more information.
51+
- Defender for IoT and certain third party servers defined in Forwarding rules. For more information, see [About forwarded alert information](how-to-forward-alert-information-to-partners.md#about-forwarded-alert-information).
5252

5353
If validation fails, communication between the relevant components is halted and a validation error is presented in the console.
5454

@@ -58,7 +58,7 @@ Following sensor and on-premises management console installation, a local self-s
5858

5959
When signing into the sensor and on-premises management console for the first time, Admin users are prompted to upload an SSL/TLS certificate. Using SSL/TLS certificates is highly recommended.
6060

61-
If the certificate is not created properly by the certificate lead or there are connection issues to it, the certificate cannot be uploaded and users will be forced to work with a locally signed certificate.
61+
If the certificate isn't created properly by the certificate lead or there are connection issues to it, the certificate can't be uploaded and users will be forced to work with a locally signed certificate.
6262

6363
The option to validate the uploaded certificate and third-party certificates is automatically enabled, but can be disabled. When disabled, encrypted communications between components continues, even if a certificate is invalid.
6464

@@ -91,7 +91,7 @@ If you are working with certificate validation, verify access to port 80 is avai
9191

9292
Certificate validation is evaluated against a Certificate Revocation List, and the certificate expiration date. This means appliance should be able to establish connection to the CRL server defined by the certificate. By default, the certificate will reference the CRL URL on HTTP port 80.
9393

94-
Some organizational security policies may block access to this port. If your organization does not have access to port 80, you can:
94+
Some organizational security policies may block access to this port. If your organization doesn't have access to port 80, you can:
9595

9696
1. Define another URL and a specific port in the certificate.
9797

@@ -103,11 +103,11 @@ Some organizational security policies may block access to this port. If your org
103103

104104
### File type requirements
105105

106-
Defender for IoT requires that each CA-signed certificate contains a .key file and a .crt file. These files are uploaded to the sensor and On-premises management console after login. Some organizations may require .pem file. Defender for IoT does not require this file type.
106+
Defender for IoT requires that each CA-signed certificate contains a .key file and a .crt file. These files are uploaded to the sensor and On-premises management console after login. Some organizations may require .pem file. Defender for IoT doesn't require this file type.
107107

108108
**.crt – certificate container file**
109109

110-
A .pem, or .der formatted file with a different extension. The file is recognized by Windows Explorer as a certificate. The .pem file is not recognized by Windows Explorer.
110+
A .pem, or .der formatted file with a different extension. The file is recognized by Windows Explorer as a certificate. The .pem file isn't recognized by Windows Explorer.
111111

112112
**.key – Private key file**
113113

@@ -121,7 +121,7 @@ You may need to convert existing files types to supported types. See [Convert ex
121121

122122
### Certificate file parameter requirements
123123

124-
Verify that you have met the following parameter requirements before creating a certificate:
124+
Verify that you've met the following parameter requirements before creating a certificate:
125125

126126
- [CRT file requirements](#crt-file-requirements)
127127
- [Key file requirements](#key-file-requirements)
@@ -180,9 +180,9 @@ You can test certificates before deploying them to your sensors and on-premises
180180

181181
| **Test** | **CLI command** |
182182
|--|--|
183-
| Check a Certificate Signing Request (CSR) | openssl req -text -noout -verify -in CSR.csr |
184-
| Check a private key | openssl rsa -in privateKey.key -check |
185-
| Check a certificate | openssl x509 -in certificate.crt -text -noout |
183+
| Check a Certificate Signing Request (CSR) | `openssl req -text -noout -verify -in CSR.csr` |
184+
| Check a private key | `openssl rsa -in privateKey.key -check` |
185+
| Check a certificate | `openssl x509 -in certificate.crt -text -noout` |
186186

187187
If these tests fail, review [Certificate file parameter requirements](#certificate-file-parameter-requirements) to verify file parameters are accurate, or consult your certificate lead.
188188

@@ -212,7 +212,7 @@ Admin users attempting to log in to the sensor or on-premises management console
212212
| This SSL certificate has expired and is not considered valid. | Create a new certificate with valid dates.|
213213
| This SSL certificate has expired and is not considered valid. | Create a new certificate with valid dates.|
214214
|This certificate has been revoked by the CRL and cannot be trusted for a secure connection | Create a new unrevoked certificate. |
215-
|The CRL (Certificate Revocation List) location is not reachable. Verify the URL can be accessed from this appliance | Make sure that your network configuration allows the appliance to reach the CRL Server defined in the certificate.You can use a proxy server if there are limitations in establishing a direct connection.
215+
|The CRL (Certificate Revocation List) location is not reachable. Verify the URL can be accessed from this appliance | Make sure that your network configuration allows the appliance to reach the CRL Server defined in the certificate. You can use a proxy server if there are limitations in establishing a direct connection.
216216
|Certificate validation failed | This indicates a general error in the appliance. Contact [Microsoft Support](https://support.microsoft.com/supportforbusiness/productselection?sapId=82c8f35-1b8e-f274-ec11-c6efdd6dd099).|
217217

218218
### Troubleshoot file conversions

articles/defender-for-iot/organizations/release-notes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -869,7 +869,7 @@ Webhook extended can be used to send extra data to the endpoint. The extended fe
869869

870870
### Unicode support for certificate passphrases
871871

872-
Unicode characters are now supported when working with sensor certificate passphrases. For more information, see [About certificates](how-to-deploy-certificates.md#about-certificates)
872+
Unicode characters are now supported when working with sensor certificate passphrases. For more information, see [Certificates for appliance encryption and authentication (OT appliances)](how-to-deploy-certificates.md#certificates-for-appliance-encryption-and-authentication-ot-appliances).
873873

874874
## Next steps
875875

0 commit comments

Comments
 (0)