Skip to content

Commit 72e235f

Browse files
authored
Spelling
1 parent 07f4e51 commit 72e235f

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/iot-edge/how-to-create-test-certificates.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ In this section, you clone the IoT Edge repo and execute the scripts.
7070
git clone https://github.com/Azure/iotedge.git
7171
```
7272

73-
2. Create a directory in which you want to work and copy the certficate scripts there. All certificate and key files will be created in this directory.
73+
2. Create a directory in which you want to work and copy the certificate scripts there. All certificate and key files will be created in this directory.
7474

7575
```powershell
7676
mkdir wrkdir
@@ -111,7 +111,7 @@ To create demo certificates on a Linux device, you need to clone the generation
111111
git clone https://github.com/Azure/iotedge.git
112112
```
113113

114-
2. Create a directory in which you want to work and copy the certficate scripts there. All certificate and key files will be created in this directory.
114+
2. Create a directory in which you want to work and copy the certificate scripts there. All certificate and key files will be created in this directory.
115115

116116
```bash
117117
mkdir wrkdir
@@ -171,9 +171,9 @@ If you want multiple root CA certificates, be sure to manage them in separate fo
171171

172172
This certificate is required before you can create more certificates for your IoT Edge devices and leaf devices as described in the next sections.
173173

174-
## Create identity certficate for the IoT Edge device
174+
## Create identity certificate for the IoT Edge device
175175

176-
Device identity certificates are used to provision IoT Edge devices if you choose to use X.509 certificate authentication. These certificates work whether you use manual provisioning or automatic provisioning through the Azure IoT Hub Device Provisioning Service (DPS). If you use **symmetric key** for authenticating to IoT Hub or DPS, these certficates aren't needed.
176+
Device identity certificates are used to provision IoT Edge devices if you choose to use X.509 certificate authentication. These certificates work whether you use manual provisioning or automatic provisioning through the Azure IoT Hub Device Provisioning Service (DPS). If you use **symmetric key** for authenticating to IoT Hub or DPS, these certificates aren't needed.
177177

178178
Device identity certificates go in the **Provisioning** section of the config file on the IoT Edge device.
179179

@@ -367,7 +367,7 @@ The certificates in this section are for the steps in the IoT Hub X.509 certific
367367

368368
1. Upload the root CA certificate file from your working directory, `certs\azure-iot-test-only.root.ca.cert.pem`, to your IoT hub.
369369

370-
2. If automatic verfication isn't selected, use the code provided in the Azure portal to verify that you own that root CA certificate.
370+
2. If automatic verification isn't selected, use the code provided in the Azure portal to verify that you own that root CA certificate.
371371

372372
```PowerShell
373373
New-CACertsVerificationCert "<verification code>"
@@ -390,7 +390,7 @@ The certificates in this section are for the steps in the IoT Hub X.509 certific
390390

391391
1. Upload the root CA certificate file from your working directory, `certs\azure-iot-test-only.root.ca.cert.pem`, to your IoT hub.
392392

393-
2. If automatic verfication isn't selected, use the code provided in the Azure portal to verify that you own that root CA certificate.
393+
2. If automatic verification isn't selected, use the code provided in the Azure portal to verify that you own that root CA certificate.
394394

395395
```bash
396396
./certGen.sh create_verification_certificate "<verification code>"

0 commit comments

Comments
 (0)