You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-operations/manage-mqtt-broker/howto-configure-authentication.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -368,13 +368,13 @@ These commands create a CA certificate, `ca.pem`, and a private key, `ca-key.pem
368
368
369
369
### Import a trusted CA certificate
370
370
371
-
To get started with X.509 authentication, import the trusted CA certificate into a config map in the `azure-iot-operations` namespace. To import a trusted CA certificate `ca.pem` into a config map named `client-ca`, run:
371
+
To get started with X.509 authentication, import the trusted CA certificate into a ConfigMap in the `azure-iot-operations` namespace. To import a trusted CA certificate `ca.pem` into a ConfigMap named `client-ca`, run:
In this example, the CA certificate is imported under the key `ca.pem`. The MQTT broker trusts all CA certificates in the config map, so you can use anything for the name of the key.
377
+
In this example, the CA certificate is imported under the key `ca.pem`. The MQTT broker trusts all CA certificates in the ConfigMap, so you can use anything for the name of the key.
378
378
379
379
To check that the root CA certificate is properly imported, run `kubectl describe configmap`. The result shows the same Base64 encoding of the PEM certificate file.
380
380
@@ -412,15 +412,15 @@ After the trusted CA certificate is imported, enable X.509 client authentication
412
412
1. Choose an existing authentication policy or create a new one.
413
413
1. Add a new method by selecting **Add method**.
414
414
1. Choose the method type **X.509** from the dropdown list. Then select **Add details** to configure the method.
415
-
1. On the **X.509 authentication details** pane, specify the trusted CA certificate config map name by using JSON format.
415
+
1. On the **X.509 authentication details** pane, specify the trusted CA certificate ConfigMap name by using JSON format.
416
416
417
417
```json
418
418
{
419
419
"trustedClientCaCert": "<TRUSTED_CA_CONFIGMAP>"
420
420
}
421
421
```
422
422
423
-
Replace `<TRUSTED_CA_CONFIGMAP>` with the name of the config map that contains the trusted CA certificate. For example, use `"trustedClientCaCert": "client-ca"`.
423
+
Replace `<TRUSTED_CA_CONFIGMAP>` with the name of the ConfigMap that contains the trusted CA certificate. For example, use `"trustedClientCaCert": "client-ca"`.
424
424
425
425
:::image type="content" source="media/howto-configure-authentication/x509-method.png" alt-text="Screenshot that shows using the Azure portal to set the MQTT broker X.509 authentication method." lightbox="media/howto-configure-authentication/x509-method.png":::
0 commit comments