You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-edge/how-to-create-test-certificates.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,7 +70,7 @@ In this section, you clone the IoT Edge repo and execute the scripts.
70
70
git clone https://github.com/Azure/iotedge.git
71
71
```
72
72
73
-
2. Create a directory in which you want to work and copy the certficate scripts there. All certificate and key files will be created in this directory.
73
+
2. Create a directory in which you want to work and copy the certificate scripts there. All certificate and key files will be created in this directory.
74
74
75
75
```powershell
76
76
mkdir wrkdir
@@ -111,7 +111,7 @@ To create demo certificates on a Linux device, you need to clone the generation
111
111
git clone https://github.com/Azure/iotedge.git
112
112
```
113
113
114
-
2. Create a directory in which you want to work and copy the certficate scripts there. All certificate and key files will be created in this directory.
114
+
2. Create a directory in which you want to work and copy the certificate scripts there. All certificate and key files will be created in this directory.
115
115
116
116
```bash
117
117
mkdir wrkdir
@@ -171,9 +171,9 @@ If you want multiple root CA certificates, be sure to manage them in separate fo
171
171
172
172
This certificate is required before you can create more certificates for your IoT Edge devices and leaf devices as described in the next sections.
173
173
174
-
## Create identity certficate for the IoT Edge device
174
+
## Create identity certificate for the IoT Edge device
175
175
176
-
Device identity certificates are used to provision IoT Edge devices if you choose to use X.509 certificate authentication. These certificates work whether you use manual provisioning or automatic provisioning through the Azure IoT Hub Device Provisioning Service (DPS). If you use **symmetric key** for authenticating to IoT Hub or DPS, these certficates aren't needed.
176
+
Device identity certificates are used to provision IoT Edge devices if you choose to use X.509 certificate authentication. These certificates work whether you use manual provisioning or automatic provisioning through the Azure IoT Hub Device Provisioning Service (DPS). If you use **symmetric key** for authenticating to IoT Hub or DPS, these certificates aren't needed.
177
177
178
178
Device identity certificates go in the **Provisioning** section of the config file on the IoT Edge device.
179
179
@@ -367,7 +367,7 @@ The certificates in this section are for the steps in the IoT Hub X.509 certific
367
367
368
368
1. Upload the root CA certificate file from your working directory, `certs\azure-iot-test-only.root.ca.cert.pem`, to your IoT hub.
369
369
370
-
2. If automatic verfication isn't selected, use the code provided in the Azure portal to verify that you own that root CA certificate.
370
+
2. If automatic verification isn't selected, use the code provided in the Azure portal to verify that you own that root CA certificate.
371
371
372
372
```PowerShell
373
373
New-CACertsVerificationCert "<verification code>"
@@ -390,7 +390,7 @@ The certificates in this section are for the steps in the IoT Hub X.509 certific
390
390
391
391
1. Upload the root CA certificate file from your working directory, `certs\azure-iot-test-only.root.ca.cert.pem`, to your IoT hub.
392
392
393
-
2. If automatic verfication isn't selected, use the code provided in the Azure portal to verify that you own that root CA certificate.
393
+
2. If automatic verification isn't selected, use the code provided in the Azure portal to verify that you own that root CA certificate.
0 commit comments