Skip to content

Commit 7642046

Browse files
committed
Fix sentence about security auditors
1 parent c9dec3d commit 7642046

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/iot-dps/concepts-device-oem-security-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ If you don't use a pre-loaded certificate, you must install the certificate as p
113113

114114
There are software tools available that let you run the installation process and final quality check in a single step. You can modify these tools to generate a certificate, or to pull a certificate from a pre-generated certificate store. Then the software can install the certificate where you need to install it. Software tools of this type enable you to run production quality manufacturing at scale.
115115

116-
If you need help with installing certificates in your IoT devices, contact the Microsoft security auditor program. After you have certificates installed on your devices, the next step is to learn how to enroll the devices with DPS.
116+
If you need help with installing certificates in your IoT devices, contact the Azure IoT Hub DPS product team. After you have certificates installed on your devices, the next step is to learn how to enroll the devices with DPS.
117117

118118
## Selecting device authentication options
119119
The ultimate aim of any IoT device security measure is to create a secure IoT solution. But issues such as hardware limitations, cost, and level of security expertise, all impact which options you choose. Further, your approach to security impacts how your IoT devices connect to the cloud. While there are [several elements of IoT security](https://www.microsoft.com/research/publication/seven-properties-highly-secure-devices/) to consider, a key element that every customer encounters is what authentication type to use.

0 commit comments

Comments
 (0)