Skip to content

Commit 5a58736

Browse files
committed
Acrolinx fixes
1 parent 222438b commit 5a58736

File tree

2 files changed

+38
-38
lines changed

2 files changed

+38
-38
lines changed

articles/iot-dps/quick-enroll-device-x509.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ This article shows you how to programmatically create an [enrollment group](conc
4141

4242
:::zone pivot="programming-language-java"
4343

44-
* [Java SE Development Kit 8](/azure/developer/java/fundamentals/java-support-on-azure). This article installs the [Java Service SDK](https://azure.github.io/azure-iot-sdk-java/master/service/) below. It works on both Windows and Linux. This article uses Windows.
44+
* [Java SE Development Kit 8](/azure/developer/java/fundamentals/java-support-on-azure). This article uses the [Azure IoT SDK for Java](https://azure.github.io/azure-iot-sdk-java/master/service/), which works on both Windows and Linux. This article uses Windows.
4545

4646
* [Maven 3](https://maven.apache.org/download.cgi).
4747

@@ -54,21 +54,21 @@ This article shows you how to programmatically create an [enrollment group](conc
5454
5555
## Create test certificates
5656
57-
Enrollment groups that use X.509 certificate attestation can be configured to use a root CA certificate or an intermediate certificate. The more usual case is to configure the enrollment group with an intermediate certificate. This provides more flexibility as multiple intermediate certificates can be generated or revoked by the same root CA certificate.
57+
Enrollment groups that use X.509 certificate attestation can be configured to use a root CA certificate or an intermediate certificate. The more usual case is to configure the enrollment group with an intermediate certificate. Using an intermediate certificate provides more flexibility as multiple intermediate certificates can be generated or revoked by the same root CA certificate.
5858
59-
For this article, you'll need either a root CA certificate file, an intermediate CA certificate file, or both in *.pem* or *.cer* format. One file contains the public portion of the root CA X.509 certificate and the other contains the public portion of the intermediate CA X.509 certificate.
59+
For this article, you need either a root CA certificate file, an intermediate CA certificate file, or both in *.pem* or *.cer* format. One file contains the public portion of the root CA X.509 certificate and the other contains the public portion of the intermediate CA X.509 certificate.
6060
6161
If you already have a root CA file and/or an intermediate CA file, you can continue to [Add and verify your root or intermediate CA certificate](#add-and-verify-your-root-or-intermediate-ca-certificate).
6262
63-
If you don't have a root CA file and/or an intermediate CA file, follow the steps in [Create an X.509 certificate chain](tutorial-custom-hsm-enrollment-group-x509.md?tabs=windows#create-an-x509-certificate-chain) to create them. You can stop after you complete the steps in [Create the intermediate CA certificate](tutorial-custom-hsm-enrollment-group-x509.md?tabs=windows#create-the-intermediate-ca-certificate) as you won't need device certificates to complete the steps in this article. When you're finished, you'll have two X.509 certificate files: *./certs/azure-iot-test-only.root.ca.cert.pem* and *./certs/azure-iot-test-only.intermediate.cert.pem*.
63+
If you don't have a root CA file and/or an intermediate CA file, follow the steps in [Create an X.509 certificate chain](tutorial-custom-hsm-enrollment-group-x509.md?tabs=windows#create-an-x509-certificate-chain) to create them. You can stop after you complete the steps in [Create the intermediate CA certificate](tutorial-custom-hsm-enrollment-group-x509.md?tabs=windows#create-the-intermediate-ca-certificate) as you don't need device certificates to complete the steps in this article. When you're finished, you have two X.509 certificate files: *./certs/azure-iot-test-only.root.ca.cert.pem* and *./certs/azure-iot-test-only.intermediate.cert.pem*.
6464

6565
## Add and verify your root or intermediate CA certificate
6666

6767
Devices that provision through an enrollment group using X.509 certificates, present the entire certificate chain when they authenticate with DPS. For DPS to be able to validate the certificate chain, the root or intermediate certificate configured in an enrollment group must either be a verified certificate or must roll up to a verified certificate in the certificate chain a device presents when it authenticates with the service.
6868

6969
For this article, assuming you have both a root CA certificate and an intermediate CA certificate signed by the root CA:
7070

71-
* If you plan on creating the enrollment group with the root CA certificate, you'll need to upload and verify the root CA certificate.
71+
* If you plan on creating the enrollment group with the root CA certificate, you need to upload and verify the root CA certificate.
7272

7373
* If you plan on creating the enrollment group with the intermediate CA certificate, you can upload and verify either the root CA certificate or the intermediate CA certificate. (If you have multiple intermediate CA certificates in the certificate chain, you could, alternatively, upload and verify any intermediate certificate that sits between the root CA certificate and the intermediate certificate that you create the enrollment group with.)
7474

@@ -94,7 +94,7 @@ To add and verify your root or intermediate CA certificate to the Device Provisi
9494

9595
## Get the connection string for your provisioning service
9696

97-
For the sample in this article, you'll need to copy the connection string for your provisioning service.
97+
For the sample in this article, you need the connection string for your provisioning service. Use the following steps to retrieve it.
9898

9999
1. Sign in to the [Azure portal](https://portal.azure.com).
100100

@@ -134,7 +134,7 @@ This section shows you how to create a .NET Core console application that adds a
134134

135135
1. Open *Program.cs* file in an editor.
136136

137-
1. Replace the namespace statement at the top of the file with the following:
137+
1. Replace the namespace statement at the top of the file with the following line:
138138

139139
```csharp
140140
namespace CreateEnrollmentGroup;
@@ -310,7 +310,7 @@ This section shows you how to create a Node.js script that adds an enrollment gr
310310
"-----END CERTIFICATE-----";
311311
```
312312
313-
Updating this string value manually can be prone to error. To generate the proper syntax, you can copy and paste the following command into a **Git Bash** prompt, replace `your-cert.pem` with the location of your certificate file, and press **ENTER**. This command will generate the syntax for the `PUBLIC_KEY_CERTIFICATE_STRING` string constant value and write it to the output.
313+
Updating this string value manually can be prone to error. To generate the proper syntax, you can copy and paste the following command into a **Git Bash** prompt, replace `your-cert.pem` with the location of your certificate file, and press **ENTER**. This command generates the syntax for the `PUBLIC_KEY_CERTIFICATE_STRING` string constant value and writes it to the output.
314314
315315
```bash
316316
sed 's/^/"/;$ !s/$/\\n" +/;$ s/$/"/' your-cert.pem
@@ -324,7 +324,7 @@ This section shows you how to create a Node.js script that adds an enrollment gr
324324
> * Hard-coding the connection string for the provisioning service administrator is against security best practices. Instead, the connection string should be held in a secure manner, such as in a secure configuration file or in the registry.
325325
> * Be sure to upload only the public part of the signing certificate. Never upload .pfx (PKCS12) or .pem files containing private keys to the provisioning service.
326326
327-
1. The sample allows you to set an IoT hub in the enrollment group to provision the device to. This must be an IoT hub that has been previously linked to the provisioning service. For this article, we'll let DPS choose from the linked hubs according to the default allocation policy, evenly-weighted distribution. Comment out the following statement in the file:
327+
1. The sample allows you to set an IoT hub in the enrollment group to provision the device to. This must be an IoT hub that has been previously linked to the provisioning service. For this article, we let DPS choose from the linked hubs according to the default allocation policy, evenly weighted distribution. Comment out the following statement in the file:
328328
329329
```Java
330330
enrollmentGroup.setIotHubHostName(IOTHUB_HOST_NAME); // Optional parameter.
@@ -378,7 +378,7 @@ This section shows you how to create a Node.js script that adds an enrollment gr
378378
379379
This command downloads the [Azure IoT DPS service client Maven package](https://mvnrepository.com/artifact/com.microsoft.azure.sdk.iot.provisioning/provisioning-service-client) to your machine and builds the sample. This package includes the binaries for the Java service SDK.
380380
381-
1. Switch to the *target* folder and run the sample. Be aware that the build in the previous step outputs .jar file in the *target* folder with the following file format: `provisioning-x509-sample-{version}-with-deps.jar`; for example: `provisioning-x509-sample-1.8.1-with-deps.jar`. You may need to replace the version in the command below.
381+
1. Switch to the *target* folder and run the sample. The build in the previous step outputs .jar file in the *target* folder with the following file format: `provisioning-x509-sample-{version}-with-deps.jar`; for example: `provisioning-x509-sample-1.8.1-with-deps.jar`. You may need to replace the version in the command below.
382382
383383
```cmd\sh
384384
cd target

0 commit comments

Comments
 (0)