Skip to content

Commit 6e05f1a

Browse files
committed
Incorp, round 1
1 parent a76740e commit 6e05f1a

13 files changed

+123
-67
lines changed

articles/iot-hub/.openpublishing.redirection.iot-hub.json

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1265,37 +1265,37 @@
12651265
},
12661266
{
12671267
"source_path_from_root": "/articles/iot-hub/tutorial-x509-certificates.md",
1268-
"redirect_url": "/azure/iot-hub/tutorial-x509-test-ca-certs",
1268+
"redirect_url": "/azure/iot-hub/tutorial-x509-test-certs",
12691269
"redirect_document_id": true
12701270
},
12711271
{
12721272
"source_path_from_root": "/articles/iot-hub/tutorial-x509-introduction.md",
1273-
"redirect_url": "/azure/iot-hub/tutorial-x509-test-ca-certs",
1273+
"redirect_url": "/azure/iot-hub/tutorial-x509-test-certs",
12741274
"redirect_document_id": false
12751275
},
12761276
{
12771277
"source_path_from_root": "/articles/iot-hub/tutorial-x509-openssl.md",
1278-
"redirect_url": "/azure/iot-hub/tutorial-x509-test-ca-certs",
1278+
"redirect_url": "/azure/iot-hub/tutorial-x509-test-certs",
12791279
"redirect_document_id": false
12801280
},
12811281
{
12821282
"source_path_from_root": "/articles/iot-hub/tutorial-x509-prove-possession.md",
1283-
"redirect_url": "/azure/iot-hub/tutorial-x509-test-ca-certs",
1283+
"redirect_url": "/azure/iot-hub/tutorial-x509-test-certs",
12841284
"redirect_document_id": false
12851285
},
12861286
{
12871287
"source_path_from_root": "/articles/iot-hub/tutorial-x509-self-sign.md",
1288-
"redirect_url": "/azure/iot-hub/tutorial-x509-test-ca-certs",
1288+
"redirect_url": "/azure/iot-hub/tutorial-x509-test-certs",
12891289
"redirect_document_id": false
12901290
},
12911291
{
12921292
"source_path_from_root": "/articles/iot-hub/tutorial-x509-scripts.md",
1293-
"redirect_url": "/azure/iot-hub/tutorial-x509-test-ca-certs",
1293+
"redirect_url": "/azure/iot-hub/tutorial-x509-test-certs",
12941294
"redirect_document_id": false
12951295
},
12961296
{
12971297
"source_path_from_root": "/articles/iot-hub/tutorial-x509-test-certificate.md",
1298-
"redirect_url": "/azure/iot-hub/tutorial-x509-test-ca-certs",
1298+
"redirect_url": "/azure/iot-hub/tutorial-x509-test-certs",
12991299
"redirect_document_id": false
13001300
},
13011301
{

articles/iot-hub/TOC.yml

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -42,11 +42,9 @@
4242
- name: Data visualization in Power BI
4343
displayName: Stream Analytics
4444
href: iot-hub-live-data-visualization-in-power-bi.md
45-
- name: Use X.509 certificates
46-
items:
47-
- name: Create and upload certificates for testing
48-
displayName: X.509 certificates, root certificate authority (CA), verify certificate, certificate signing request (CSR)
49-
href: tutorial-x509-test-ca-certs.md
45+
- name: Create and upload certificates for testing
46+
displayName: X.509 certificates, root certificate authority (CA), verify certificate, certificate signing request (CSR)
47+
href: tutorial-x509-test-certs.md
5048
- name: Concepts
5149
items:
5250
- name: IoT Hub concepts overview

articles/iot-hub/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ landingContent:
7373
- linkListType: tutorial
7474
links:
7575
- text: Create and upload certificates for testing
76-
url: tutorial-x509-test-ca-certs.md
76+
url: tutorial-x509-test-certs.md
7777
- linkListType: concept
7878
links:
7979
- text: Security best practices

articles/iot-hub/iot-hub-dev-guide-sas.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -266,7 +266,7 @@ The result, which would grant access to read all device identities, would be:
266266

267267
### Supported X.509 certificates
268268

269-
You can use any X.509 certificate to authenticate a device with IoT Hub by uploading either a certificate thumbprint or a certificate authority (CA) to Azure IoT Hub. To learn more, see [Device Authentication using X.509 CA Certificates](iot-hub-x509ca-overview.md). For information about how to upload and verify a certificate authority with your IoT hub for testing, see [Tutorial: Create and upload certificates for testing](tutorial-x509-test-ca-certs.md).
269+
You can use any X.509 certificate to authenticate a device with IoT Hub by uploading either a certificate thumbprint or a certificate authority (CA) to Azure IoT Hub. To learn more, see [Device Authentication using X.509 CA Certificates](iot-hub-x509ca-overview.md). For information about how to upload and verify a certificate authority with your IoT hub for testing, see [Tutorial: Create and upload certificates for testing](tutorial-x509-test-certs.md).
270270

271271
### Enforcing X.509 authentication
272272

articles/iot-hub/iot-hub-mqtt-support.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ If a device can't use the device SDKs, it can still connect to the public device
114114
`SharedAccessSignature sig={signature-string}&se={expiry}&sr={URL-encoded-resourceURI}`
115115

116116
> [!NOTE]
117-
> If you use X.509 certificate authentication, SAS token passwords are not required. For more information, see [Tutorial: Create and upload certificates for testing](tutorial-x509-test-ca-certs.md) and follow code instructions in the [TLS/SSL configuration section](#tlsssl-configuration).
117+
> If you use X.509 certificate authentication, SAS token passwords are not required. For more information, see [Tutorial: Create and upload certificates for testing](tutorial-x509-test-certs.md) and follow code instructions in the [TLS/SSL configuration section](#tlsssl-configuration).
118118
119119
For more information about how to generate SAS tokens, see the [Use SAS tokens as a device](iot-hub-dev-guide-sas.md#use-sas-tokens-as-a-device) section of [Control access to IoT Hub using Shared Access Signatures](iot-hub-dev-guide-sas.md).
120120

articles/iot-hub/iot-hub-tls-support.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,7 @@ After a successful TLS handshake, IoT Hub can authenticate a device using a symm
128128

129129
## Mutual TLS support
130130

131-
Mutual TLS authentication ensures that the client _authenticates_ the server (IoT Hub) certificate and the server (IoT Hub) _authenticates_ the [X.509 client certificate or X.509 thumbprint](tutorial-x509-test-ca-certs.md#create-a-client-certificate-for-a-device). _Authorization_ is performed by IoT Hub after _authentication_ is complete.
131+
Mutual TLS authentication ensures that the client _authenticates_ the server (IoT Hub) certificate and the server (IoT Hub) _authenticates_ the [X.509 client certificate or X.509 thumbprint](tutorial-x509-test-certs.md#create-a-client-certificate-for-a-device). _Authorization_ is performed by IoT Hub after _authentication_ is complete.
132132

133133
For AMQP and MQTT protocols, IoT Hub requests a client certificate in the initial TLS handshake. If one is provided, IoT Hub _authenticates_ the client certificate and the client _authenticates_ the IoT Hub certificate. This process is called mutual TLS authentication. When IoT Hub receives an MQTT connect packet or an AMQP link opens, IoT Hub performs _authorization_ for the requesting client and determines if the client requires X.509 authentication. If mutual TLS authentication was completed and the client is authorized to connect as the device, it is allowed. However, if the client requires X.509 authentication and client authentication was not completed during the TLS handshake, then IoT Hub rejects the connection.
134134

articles/iot-hub/iot-hub-x509-certificate-concepts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -121,10 +121,10 @@ To learn more about the fields that make up an X.509 certificate, see [X.509 cer
121121

122122
If you're already familiar with X.509 certificates, and you want to generate test versions that you can use to authenticate to your IoT hub, see the following articles:
123123

124-
* [Tutorial: Create and upload certificates for testing](tutorial-x509-test-ca-certs.md)
124+
* [Tutorial: Create and upload certificates for testing](tutorial-x509-test-certs.md)
125125
* If you want to use self-signed certificates for testing, see the [Create a self-signed certificate](reference-x509-certificates.md#create-a-self-signed-certificate) section of [X.509 certificates](reference-x509-certificates.md).
126126

127127
>[!IMPORTANT]
128128
>We recommend that you use certificates signed by an issuing Certificate Authority (CA), even for testing purposes. Never use self-signed certificates in production.
129129
130-
If you have a root CA certificate or subordinate CA certificate and you want to upload it to your IoT hub, you must verify that you own that certificate. For more information, see [Tutorial: Create and upload certificates for testing](tutorial-x509-test-ca-certs.md).
130+
If you have a root CA certificate or subordinate CA certificate and you want to upload it to your IoT hub, you must verify that you own that certificate. For more information, see [Tutorial: Create and upload certificates for testing](tutorial-x509-test-certs.md).

articles/iot-hub/iot-hub-x509ca-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ The X.509 CA certificate is at the top of the chain of certificates for each of
3030

3131
For production environments, we recommend that you purchase an X.509 CA certificate from a professional certificate services provider. Purchasing a CA certificate has the benefit of the root CA acting as a trusted third party to vouch for the legitimacy of your devices. Consider this option if your devices are part of an open IoT network where they interact with third-party products or services.
3232

33-
You may also create a self-signed X.509 CA certificate for testing purposes. For more information about creating certificates for testing, see [Create and upload certificates for testing](tutorial-x509-test-ca-certs.md).
33+
You may also create a self-signed X.509 CA certificate for testing purposes. For more information about creating certificates for testing, see [Create and upload certificates for testing](tutorial-x509-test-certs.md).
3434

3535
>[!NOTE]
3636
>We do not recommend the use of self-signed certificates for production environments.
@@ -55,7 +55,7 @@ The upload process entails uploading a file that contains your certificate. Thi
5555

5656
The proof of possession step involves a cryptographic challenge and response process between you and IoT Hub. Given that digital certificate contents are public and therefore susceptible to eavesdropping, IoT Hub has to verify that you really own the CA certificate. You can choose to either automatically or manually verify ownership. For manual verification, Azure IoT Hub generates a random challenge that you sign with the CA certificate's corresponding private key. If you kept the private key secret and protected as recommended, then only you possess the knowledge to complete this step. Secrecy of private keys is the source of trust in this method. After signing the challenge, you complete this step and manually verify your certificate by uploading a file containing the results.
5757

58-
Learn how to [register your CA certificate](tutorial-x509-test-ca-certs.md#register-your-subordinate-ca-certificate-to-your-iot-hub).
58+
Learn how to [register your CA certificate](tutorial-x509-test-certs.md#register-your-subordinate-ca-certificate-to-your-iot-hub).
5959

6060
## Create a device on IoT Hub
6161

0 commit comments

Comments
 (0)