Skip to content

Commit 81c0684

Browse files
gordonwang0jlian
andauthored
Update articles/iot-operations/manage-mqtt-broker/howto-configure-authentication.md
Co-authored-by: John Lian <[email protected]>
1 parent ed9baff commit 81c0684

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/iot-operations/manage-mqtt-broker/howto-configure-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -332,7 +332,7 @@ For more information about enabling secure settings by configuring an Azure Key
332332

333333
In X.509 authentication, MQTT broker uses a trusted CA certificate to validate client certificates. Clients present a certificate rooted in this CA for MQTT broker to authenticate them. Both EC and RSA keys are supported, but all certificates in the chain must use the same key algorithm. Since X.509 relies on TLS client certificates, TLS must be enabled for ports using X.509 authentication.
334334

335-
If you're importing your own CA certificates, ensure that the client certificate uses the same key algorithm as the CAs. To import a root certificate that can be used to validate client certificates, import the certificate PEM as *ConfigMap*. For example:
335+
To import a root certificate that can be used to validate client certificates, store the certificate PEM in a *ConfigMap*. For example:
336336

337337
```bash
338338
kubectl create configmap client-ca --from-file=client_ca.pem -n azure-iot-operations

0 commit comments

Comments
 (0)