You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-deploy-certificates.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,11 +1,11 @@
1
1
---
2
-
title: Deploy certificates
2
+
title: Setting SSL/TLS appliance certificates
3
3
description: Learn how to set up and deploy certificates for Defender for IoT.
4
4
ms.date: 02/06/2022
5
5
ms.topic: how-to
6
6
---
7
7
8
-
# About certificates
8
+
# Certificates for appliance encryption and authentication (OT appliances)
9
9
10
10
This article provides information needed when creating and deploying certificates for Microsoft Defender for IoT. A security, PKI or other qualified certificate lead should handle certificate creation and deployment.
11
11
@@ -43,12 +43,12 @@ Validation is evaluated against:
43
43
44
44
Validation is carried out twice:
45
45
46
-
1. When uploading the certificate to sensors and on-premises management consoles. If validation fails, the certificate cannot be uploaded.
46
+
1. When uploading the certificate to sensors and on-premises management consoles. If validation fails, the certificate can't be uploaded.
47
47
1. When initiating encrypted communication between:
48
48
49
49
- Defender for IoT system components, for example, a sensor and on-premises management console.
50
50
51
-
- Defender for IoT and certain 3rd party servers defined in Forwarding rules. See [About forwarded alert information](how-to-forward-alert-information-to-partners.md#about-forwarded-alert-information) for more information.
51
+
- Defender for IoT and certain third party servers defined in Forwarding rules. For more information, see [About forwarded alert information](how-to-forward-alert-information-to-partners.md#about-forwarded-alert-information).
52
52
53
53
If validation fails, communication between the relevant components is halted and a validation error is presented in the console.
54
54
@@ -58,7 +58,7 @@ Following sensor and on-premises management console installation, a local self-s
58
58
59
59
When signing into the sensor and on-premises management console for the first time, Admin users are prompted to upload an SSL/TLS certificate. Using SSL/TLS certificates is highly recommended.
60
60
61
-
If the certificate is not created properly by the certificate lead or there are connection issues to it, the certificate cannot be uploaded and users will be forced to work with a locally signed certificate.
61
+
If the certificate isn't created properly by the certificate lead or there are connection issues to it, the certificate can't be uploaded and users will be forced to work with a locally signed certificate.
62
62
63
63
The option to validate the uploaded certificate and third-party certificates is automatically enabled, but can be disabled. When disabled, encrypted communications between components continues, even if a certificate is invalid.
64
64
@@ -91,7 +91,7 @@ If you are working with certificate validation, verify access to port 80 is avai
91
91
92
92
Certificate validation is evaluated against a Certificate Revocation List, and the certificate expiration date. This means appliance should be able to establish connection to the CRL server defined by the certificate. By default, the certificate will reference the CRL URL on HTTP port 80.
93
93
94
-
Some organizational security policies may block access to this port. If your organization does not have access to port 80, you can:
94
+
Some organizational security policies may block access to this port. If your organization doesn't have access to port 80, you can:
95
95
96
96
1. Define another URL and a specific port in the certificate.
97
97
@@ -103,11 +103,11 @@ Some organizational security policies may block access to this port. If your org
103
103
104
104
### File type requirements
105
105
106
-
Defender for IoT requires that each CA-signed certificate contains a .key file and a .crt file. These files are uploaded to the sensor and On-premises management console after login. Some organizations may require .pem file. Defender for IoT does not require this file type.
106
+
Defender for IoT requires that each CA-signed certificate contains a .key file and a .crt file. These files are uploaded to the sensor and On-premises management console after login. Some organizations may require .pem file. Defender for IoT doesn't require this file type.
107
107
108
108
**.crt – certificate container file**
109
109
110
-
A .pem, or .der formatted file with a different extension. The file is recognized by Windows Explorer as a certificate. The .pem file is not recognized by Windows Explorer.
110
+
A .pem, or .der formatted file with a different extension. The file is recognized by Windows Explorer as a certificate. The .pem file isn't recognized by Windows Explorer.
111
111
112
112
**.key – Private key file**
113
113
@@ -121,7 +121,7 @@ You may need to convert existing files types to supported types. See [Convert ex
121
121
122
122
### Certificate file parameter requirements
123
123
124
-
Verify that you have met the following parameter requirements before creating a certificate:
124
+
Verify that you've met the following parameter requirements before creating a certificate:
125
125
126
126
-[CRT file requirements](#crt-file-requirements)
127
127
-[Key file requirements](#key-file-requirements)
@@ -180,9 +180,9 @@ You can test certificates before deploying them to your sensors and on-premises
| Check a private key |`openssl rsa -in privateKey.key -check`|
185
+
| Check a certificate |`openssl x509 -in certificate.crt -text -noout`|
186
186
187
187
If these tests fail, review [Certificate file parameter requirements](#certificate-file-parameter-requirements) to verify file parameters are accurate, or consult your certificate lead.
188
188
@@ -212,7 +212,7 @@ Admin users attempting to log in to the sensor or on-premises management console
212
212
| This SSL certificate has expired and is not considered valid. | Create a new certificate with valid dates.|
213
213
| This SSL certificate has expired and is not considered valid. | Create a new certificate with valid dates.|
214
214
|This certificate has been revoked by the CRL and cannot be trusted for a secure connection | Create a new unrevoked certificate. |
215
-
|The CRL (Certificate Revocation List) location is not reachable. Verify the URL can be accessed from this appliance | Make sure that your network configuration allows the appliance to reach the CRL Server defined in the certificate.You can use a proxy server if there are limitations in establishing a direct connection.
215
+
|The CRL (Certificate Revocation List) location is not reachable. Verify the URL can be accessed from this appliance | Make sure that your network configuration allows the appliance to reach the CRL Server defined in the certificate.You can use a proxy server if there are limitations in establishing a direct connection.
216
216
|Certificate validation failed | This indicates a general error in the appliance. Contact [Microsoft Support](https://support.microsoft.com/supportforbusiness/productselection?sapId=82c8f35-1b8e-f274-ec11-c6efdd6dd099).|
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/release-notes.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -869,7 +869,7 @@ Webhook extended can be used to send extra data to the endpoint. The extended fe
869
869
870
870
### Unicode support for certificate passphrases
871
871
872
-
Unicode characters are now supported when working with sensor certificate passphrases. For more information, see [About certificates](how-to-deploy-certificates.md#about-certificates)
872
+
Unicode characters are now supported when working with sensor certificate passphrases. For more information, see [Certificates for appliance encryption and authentication (OT appliances)](how-to-deploy-certificates.md#certificates-for-appliance-encryption-and-authentication-ot-appliances).
0 commit comments