Skip to content

Commit 896e5cb

Browse files
committed
edit pass: mqtt-broker-batch2
1 parent ad40af6 commit 896e5cb

File tree

2 files changed

+10
-10
lines changed

2 files changed

+10
-10
lines changed

articles/iot-operations/manage-mqtt-broker/howto-configure-authentication.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -368,13 +368,13 @@ These commands create a CA certificate, `ca.pem`, and a private key, `ca-key.pem
368368

369369
### Import a trusted CA certificate
370370

371-
To get started with X.509 authentication, import the trusted CA certificate into a config map in the `azure-iot-operations` namespace. To import a trusted CA certificate `ca.pem` into a config map named `client-ca`, run:
371+
To get started with X.509 authentication, import the trusted CA certificate into a ConfigMap in the `azure-iot-operations` namespace. To import a trusted CA certificate `ca.pem` into a ConfigMap named `client-ca`, run:
372372

373373
```bash
374374
kubectl create configmap client-ca --from-file=ca.pem -n azure-iot-operations
375375
```
376376

377-
In this example, the CA certificate is imported under the key `ca.pem`. The MQTT broker trusts all CA certificates in the config map, so you can use anything for the name of the key.
377+
In this example, the CA certificate is imported under the key `ca.pem`. The MQTT broker trusts all CA certificates in the ConfigMap, so you can use anything for the name of the key.
378378

379379
To check that the root CA certificate is properly imported, run `kubectl describe configmap`. The result shows the same Base64 encoding of the PEM certificate file.
380380

@@ -412,15 +412,15 @@ After the trusted CA certificate is imported, enable X.509 client authentication
412412
1. Choose an existing authentication policy or create a new one.
413413
1. Add a new method by selecting **Add method**.
414414
1. Choose the method type **X.509** from the dropdown list. Then select **Add details** to configure the method.
415-
1. On the **X.509 authentication details** pane, specify the trusted CA certificate config map name by using JSON format.
415+
1. On the **X.509 authentication details** pane, specify the trusted CA certificate ConfigMap name by using JSON format.
416416

417417
```json
418418
{
419419
"trustedClientCaCert": "<TRUSTED_CA_CONFIGMAP>"
420420
}
421421
```
422422

423-
Replace `<TRUSTED_CA_CONFIGMAP>` with the name of the config map that contains the trusted CA certificate. For example, use `"trustedClientCaCert": "client-ca"`.
423+
Replace `<TRUSTED_CA_CONFIGMAP>` with the name of the ConfigMap that contains the trusted CA certificate. For example, use `"trustedClientCaCert": "client-ca"`.
424424
425425
:::image type="content" source="media/howto-configure-authentication/x509-method.png" alt-text="Screenshot that shows using the Azure portal to set the MQTT broker X.509 authentication method." lightbox="media/howto-configure-authentication/x509-method.png":::
426426
@@ -473,7 +473,7 @@ resource myBrokerAuthentication 'Microsoft.IoTOperations/instances/brokers/authe
473473

474474
```
475475

476-
Replace `<TRUSTED_CA_CONFIGMAP>` with the name of the config map that contains the trusted CA certificate. For example, use `client-ca`.
476+
Replace `<TRUSTED_CA_CONFIGMAP>` with the name of the ConfigMap that contains the trusted CA certificate. For example, use `client-ca`.
477477

478478
Deploy the Bicep file by using the Azure CLI:
479479

@@ -494,7 +494,7 @@ spec:
494494
## See the next section for more information
495495
```
496496

497-
Replace `<TRUSTED_CA_CONFIGMAP>` with the name of the config map that contains the trusted CA certificate. For example, use `client-ca`.
497+
Replace `<TRUSTED_CA_CONFIGMAP>` with the name of the ConfigMap that contains the trusted CA certificate. For example, use `client-ca`.
498498

499499
---
500500

articles/iot-operations/manage-mqtt-broker/howto-configure-authorization.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -162,7 +162,7 @@ This broker authorization allows clients with the client IDs `temperature-sensor
162162
- `temperature-sensor` can publish to `/telemetry/temperature-sensor` and `/telemetry/contoso`.
163163
- `humidity-sensor` can publish to `/telemetry/humidity-sensor` and `/telemetry/contoso`.
164164
- `some-other-username` can publish to `/telemetry/contoso`.
165-
- Subscribe to command topics scoped with their organization. For example:
165+
- Subscribe to `/commands/` topics scoped with their organization. For example:
166166
- `temperature-sensor` can subscribe to `/commands/contoso`.
167167
- `some-other-username` can subscribe to `/commands/contoso`.
168168

@@ -560,13 +560,13 @@ The `method` field specifies the access level:
560560

561561
The `keyType` field specifies the type of key matching:
562562

563-
- `pattern`: Used for *Glob* style pattern matching.
563+
- `pattern`: Used for glob-style pattern matching.
564564
- `string`: Used to do exact match, for example, when a key contains characters that might be otherwise matched as a pattern (`*`, `?`, `[0-9]`).
565565
- `binary`: Used to match a binary key.
566566

567-
The `keys` field specifies the keys to match. You can specify the keys as *Glob* style patterns, token substitutions, or exact strings.
567+
The `keys` field specifies the keys to match. You can specify the keys as glob-style patterns, token substitutions, or exact strings.
568568

569-
- *Glob* style examples:
569+
- Glob style examples:
570570

571571
- `colors/*`: All keys under the "colors/" prefix
572572
- `number[0-9]`: Any key from "number0" to "number9"

0 commit comments

Comments
 (0)