You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-deploy-certificates.md
+33-33Lines changed: 33 additions & 33 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,11 +25,13 @@ Make sure to create a unique certificate for each OT sensor, on-premises managem
25
25
To perform the procedures described in this article, make sure that:
26
26
27
27
- You have a security, PKI or certificate specialist available to oversee the certificate creation
28
-
- You can access the OT network sensor or on-premises management console as an **Admin** user. For more information, see [On-premises users and roles for OT monitoring with Defender for IoT](roles-on-premises.md).
28
+
- You can access the OT network sensor or on-premises management console as an **Admin** user.
29
+
30
+
For more information, see [On-premises users and roles for OT monitoring with Defender for IoT](roles-on-premises.md).
29
31
30
32
## Create SSL/TLS certificates
31
33
32
-
Create SSL/TLS certificates by first downloading the certificate from the OT sensor or on-premises management console and exporting it to the required file types.
34
+
Create SSL/TLS certificates by first downloading a security certificate from the OT sensor or on-premises management console and then exporting it to the required file types.
33
35
34
36
### Download a security certificate
35
37
@@ -41,7 +43,9 @@ Create SSL/TLS certificates by first downloading the certificate from the OT sen
41
43
42
44
1. Select the :::image type="icon" source="media/how-to-activate-and-set-up-your-sensor/show-certificate-icon.png" border="false"::: **Show certificate** icon to view the security certificate for this website.
43
45
44
-
### Create self-signed SSL/TLS certificates
46
+
1. In the **Certificate viewer** pane, select the **Details** tab, then select **Export** to save the file on your local machine.
47
+
48
+
### Export an SSL/TLS certificate
45
49
46
50
1. Use a certificate management platform to create the following types of SSL/TLS certificate files:
47
51
@@ -51,9 +55,7 @@ Create SSL/TLS certificates by first downloading the certificate from the OT sen
51
55
|**.key – Private key file**| A key file is in the same format as a `.pem` file, with a different extension for support in Windows Explorer.|
52
56
|**.pem – certificate container file (optional)**| Optional. A text file with a Base64-encoding of the certificate text, and a plain-text header and footer to mark the beginning and end of the certificate. |
53
57
54
-
For example: <!--i'm not sure now. is this the procedure to create a self-signed certificate? maybe we should divide it up, or give this a different title?-->
55
-
56
-
1. In the **Certificate viewer** pane, select the **Details** tab, then select **Export** to save the file on your local machine.
58
+
For example:
57
59
58
60
1. Open the downloaded certificate file and select the **Details** tab > **Copy to file** to run the **Certificate Export Wizard**.
59
61
@@ -67,30 +69,32 @@ Create SSL/TLS certificates by first downloading the certificate from the OT sen
67
69
> You may need to convert existing files types to supported types.
68
70
> For more information, see [Convert existing files to supported files](#convert-existing-files-to-supported-files).
69
71
70
-
1. <aname="1"></a> Verify that the certificates meet the following requirements:
Verify that the certificates meet the following requirements:
71
75
72
-
-**CRT file requirements**:
76
+
-**CRT file requirements**:
73
77
74
-
| Field | Requirement |
75
-
|---------|---------|
76
-
|**Signature Algorithm**| SHA256RSA |
77
-
|**Signature Hash Algorithm**| SHA256 |
78
-
|**Valid from**| A valid past date |
79
-
|**Valid To**| A valid future date |
80
-
|**Public Key**| RSA 2048 bits (Minimum) or 4096 bits |
81
-
|**CRL Distribution Point**| URL to a CRL server. If your organization doesn't [validate certificates against a CRL server](#verify-crl-server-access), remove this line from the certificate. |
82
-
|**Subject CN (Common Name)**| domain name of the appliance, such as *sensor.contoso.com*, or *.contoso.com*|
83
-
|**Subject (C)ountry**| Certificate country code, such as `US`|
84
-
|**Subject (OU) Org Unit**| The organization's unit name, such as *Contoso Labs*|
85
-
|**Subject (O)rganization**| The organization's name, such as *Contoso Inc.*|
78
+
| Field | Requirement |
79
+
|---------|---------|
80
+
|**Signature Algorithm**| SHA256RSA |
81
+
|**Signature Hash Algorithm**| SHA256 |
82
+
|**Valid from**| A valid past date |
83
+
|**Valid To**| A valid future date |
84
+
|**Public Key**| RSA 2048 bits (Minimum) or 4096 bits |
85
+
|**CRL Distribution Point**| URL to a CRL server. If your organization doesn't [validate certificates against a CRL server](#verify-crl-server-access), remove this line from the certificate. |
86
+
|**Subject CN (Common Name)**| domain name of the appliance, such as *sensor.contoso.com*, or *.contoso.com*|
87
+
|**Subject (C)ountry**| Certificate country code, such as `US`|
88
+
|**Subject (OU) Org Unit**| The organization's unit name, such as *Contoso Labs*|
89
+
|**Subject (O)rganization**| The organization's name, such as *Contoso Inc.*|
86
90
87
-
> [!IMPORTANT]
88
-
> While certificates with other parameters might work, they aren't supported by Defender for IoT. Additionally, wildcard SSL certificates, which are public key certificates that can be used on multiple subdomains such as *.contoso.com*, are insecure and aren't supported.
89
-
> Each appliance must use a unique CN.<!--what is this?-->
91
+
> [!IMPORTANT]
92
+
> While certificates with other parameters might work, they aren't supported by Defender for IoT. Additionally, wildcard SSL certificates, which are public key certificates that can be used on multiple subdomains such as *.contoso.com*, are insecure and aren't supported.
93
+
> Each appliance must use a unique CN.
90
94
91
-
-**Key file requirements**: Use either RSA 2048 bits or 4096 bits. Using a key length of 4096 bits will slow down the SSL handshake at the start of each connection, and increase the CPU usage during handshakes.
95
+
-**Key file requirements**: Use either RSA 2048 bits or 4096 bits. Using a key length of 4096 bits will slow down the SSL handshake at the start of each connection, and increase the CPU usage during handshakes.
92
96
93
-
1. (Optional) Create a certificate chain, which is a `.pem` file that contains the certificates of all the certificate authorities in the chain of trust that led to your certificate. Certificate chain files support bag attributes. <!--what is this and why do we care?-->
97
+
- (Optional) Create a certificate chain, which is a `.pem` file that contains the certificates of all the certificate authorities in the chain of trust that led to your certificate. Certificate chain files support bag attributes. <!--what is this and why do we care?-->
94
98
95
99
## Verify CRL server access
96
100
@@ -109,8 +113,6 @@ If your OT sensors and on-premises management consoles can't access your CRL ser
109
113
110
114
If validation fails, communication between the relevant components is halted and a validation error is presented in the console.
111
115
112
-
import the certificate by installing it on a trusted store.
113
-
114
116
## Import the SSL/TLS certificate to a trusted store
115
117
116
118
After creating your certificate, import it to a trusted storage location. For example:
@@ -148,7 +150,7 @@ If you want to check the information within the certificate `.csr` file or priva
148
150
-**Check a private key**: Run `openssl rsa -in privateKey.key -check`
149
151
-**Check a certificate**: Run `openssl x509 -in certificate.crt -text -noout`
150
152
151
-
If these tests fail, review certificate file parameter requirements <sup>[1](#1)</sup> to verify that your file parameters are accurate, or consult your certificate specialist.
153
+
If these tests fail, review [certificate file parameter requirements](#verify-certificate-file-parameter-requirements) to verify that your file parameters are accurate, or consult your certificate specialist.
152
154
153
155
### Validate the certificate's common name
154
156
@@ -170,8 +172,6 @@ If these tests fail, review certificate file parameter requirements <sup>[1](#1)
170
172
171
173
:::image type="content" source="media/how-to-activate-and-set-up-your-sensor/hosts-file.png" alt-text="Screenshot of the hosts file." lightbox="media/how-to-activate-and-set-up-your-sensor/hosts-file.png":::
172
174
173
-
<!--how do these last 2 steps validate the name? are they related or something different?-->
174
-
175
175
## Deploy an SSL/TLS certificate
176
176
177
177
After you've created your SSL/TLS certificate as required and have it installed on a trusted storage, deploy it to your OT sensor or on-premises management console.
@@ -184,7 +184,7 @@ After you've created your SSL/TLS certificate as required and have it installed
184
184
185
185
Select **Enable certificate validation** to validate the certificate against a [CRL server](#verify-crl-server-access).
186
186
187
-
[!NOTE]
187
+
> [!NOTE]
188
188
> While you can also use a locally-generated and self-signed certificate, we do not recommend this option.
189
189
190
190
1. Select **Save** to save your certificate settings.
@@ -212,7 +212,7 @@ Use the following CLI commands to convert existing certificate files to supporte
212
212
| Convert a PKCS#12 file (.pfx .p12) containing a private key and certificates to .pem |`openssl pkcs12 -in keyStore.pfx -out keyStore.pem -nodes`. You can add -nocerts to only output the private key, or add -nokeys to only output the certificates. |
213
213
| Convert .cer file to .crt file |`openssl x509 -inform PEM -in <filepath>/certificate.cer -out certificate.crt` <br> Make sure to specify the full path. <br><br> **Note**: Other options are available for the -inform flag. The value is usually `DER` or `PEM` but might also be `P12` or another value. For more information, see [`openssl-format-options`](https://www.openssl.org/docs/manmaster/man1/openssl-format-options.html) and [openssl-x509](https://www.openssl.org/docs/manmaster/man1/openssl-x509.html). |
214
214
215
-
Your file conversion may create an invalid certificate, such as with an inaccurate structure. If the conversion fails, make sure your required parameters <sup>[1](#1)</sup> are correct or consult your certificate specialist.
215
+
Your file conversion may create an invalid certificate, such as with an inaccurate structure. If the conversion fails, make sure your [required parameters](#verify-certificate-file-parameter-requirements) are correct or consult your certificate specialist.
216
216
217
217
## Troubleshoot certificate upload errors
218
218
@@ -229,7 +229,7 @@ You won't be able to upload certificates to your OT sensors or on-premises manag
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-forward-alert-information-to-partners.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -302,7 +302,7 @@ If your forwarding alert rules aren't working as expected, check the following d
302
302
303
303
-**Certificate validation**. Forwarding rules for [Syslog CEF](#syslog-server-actions), [Microsoft Sentinel](integrate-overview.md#microsoft-sentinel), and [QRadar](tutorial-qradar.md) support encryption and certificate validation.
304
304
305
-
If your OT sensors or on-premises management console are configured to [validate certificates](how-to-deploy-certificates.md.md#verify-crl-server-access) and the certificate can't be verified, the alerts aren't forwarded.
305
+
If your OT sensors or on-premises management console are configured to [validate certificates](how-to-deploy-certificates.md#verify-crl-server-access) and the certificate can't be verified, the alerts aren't forwarded.
306
306
307
307
In these cases, the sensor or on-premises management console is the session's client and initiator. Certificates are typically received from the server or use asymmetric encryption, where a specific certificate is provided to set up the integration.
0 commit comments