You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-deploy-certificates.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,7 +70,7 @@ This section describes the steps you need to take to ensure that certificate dep
70
70
71
71
- A security, PKI or certificate specialist is creating or overseeing certificate creation.
72
72
- You create a unique certificate for each sensor, management console and HA machine.
73
-
- You meetcertificate creation requirements. See [Supported SSL certificates](#supported-ssl-certificates).
73
+
- You meet[certificate creation requirements](#supported-ssl-certificates).
74
74
- Admin users logging in to each Defender for IoT sensor, and on-premises management console and HA machine have access to the certificate.
75
75
76
76
## Supported SSL certificates
@@ -103,7 +103,7 @@ Some organizational security policies may block access to this port. If your org
103
103
104
104
### Supported certificate file types
105
105
106
-
Defender for IoT requires that each CA-signed certificate contains a .key file and a .crt file. These files are uploaded to the sensor and On-premises management console after login. Some organizations may require .pem file. Defender for IoT doesn't require this file type.
106
+
Defender for IoT requires that each CA-signed certificate contains a .key file and a .crt file. These files are uploaded to the sensor and On-premises management console after login. Some organizations may require a .pem file. Defender for IoT doesn't require this file type.
107
107
108
108
**.crt – certificate container file**
109
109
@@ -160,7 +160,7 @@ Bag attributes are supported in the certificate chain file.
160
160
161
161
## Create SSL certificates
162
162
163
-
Use a certificate management platform to create a certificate, for example, an automated PKI management platform. Verify that the certificates meet certificate file requirements. See Test certificates for information on testing the files you create.
163
+
Use a certificate management platform to create a certificate, for example, an automated PKI management platform. Verify that the certificates meet certificate file requirements. For more information on testing the files you create, see [Test certificates you create](#test-certificates-you-create).
164
164
165
165
If you are not carrying out certificate validation, remove the CRL URL reference in the certificate. See [CRT file requirements](#crt-file-requirements) for information about this parameter.
166
166
@@ -172,13 +172,13 @@ You can also convert existing certificate files if you don't want to create new
172
172
173
173
### Sample Certificate
174
174
175
-
You can compare your certificate to the following sample certificate. Verify that the same fields exits and that the order of the fields is the same:
175
+
Compare your certificate to the following sample certificate. Verify that the same fields exits and that the order of the fields is the same:
176
176
177
177
:::image type="content" source="media/how-to-deploy-certificates/sample-certificate.png" alt-text="Screenshot of a sample certificate.":::
178
178
179
179
## Test certificates you create
180
180
181
-
You can test certificates before deploying them to your sensors and on-premises management consoles. If you want to check the information within the certificate .csr file or private key file, use these commands:
181
+
Test certificates before deploying them to your sensors and on-premises management consoles. If you want to check the information within the certificate .csr file or private key file, use these commands:
0 commit comments