Skip to content

Commit 91f6e0c

Browse files
committed
style fixes
1 parent 3168633 commit 91f6e0c

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/defender-for-iot/organizations/how-to-deploy-certificates.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ This section describes the steps you need to take to ensure that certificate dep
7070

7171
- A security, PKI or certificate specialist is creating or overseeing certificate creation.
7272
- You create a unique certificate for each sensor, management console and HA machine.
73-
- You meet certificate creation requirements. See [Supported SSL certificates](#supported-ssl-certificates).
73+
- You meet[certificate creation requirements](#supported-ssl-certificates).
7474
- Admin users logging in to each Defender for IoT sensor, and on-premises management console and HA machine have access to the certificate.
7575

7676
## Supported SSL certificates
@@ -103,7 +103,7 @@ Some organizational security policies may block access to this port. If your org
103103

104104
### Supported certificate file types
105105

106-
Defender for IoT requires that each CA-signed certificate contains a .key file and a .crt file. These files are uploaded to the sensor and On-premises management console after login. Some organizations may require .pem file. Defender for IoT doesn't require this file type.
106+
Defender for IoT requires that each CA-signed certificate contains a .key file and a .crt file. These files are uploaded to the sensor and On-premises management console after login. Some organizations may require a .pem file. Defender for IoT doesn't require this file type.
107107

108108
**.crt – certificate container file**
109109

@@ -160,7 +160,7 @@ Bag attributes are supported in the certificate chain file.
160160

161161
## Create SSL certificates
162162

163-
Use a certificate management platform to create a certificate, for example, an automated PKI management platform. Verify that the certificates meet certificate file requirements. See Test certificates for information on testing the files you create.
163+
Use a certificate management platform to create a certificate, for example, an automated PKI management platform. Verify that the certificates meet certificate file requirements. For more information on testing the files you create, see [Test certificates you create](#test-certificates-you-create).
164164

165165
If you are not carrying out certificate validation, remove the CRL URL reference in the certificate. See [CRT file requirements](#crt-file-requirements) for information about this parameter.
166166

@@ -172,13 +172,13 @@ You can also convert existing certificate files if you don't want to create new
172172

173173
### Sample Certificate
174174

175-
You can compare your certificate to the following sample certificate. Verify that the same fields exits and that the order of the fields is the same:
175+
Compare your certificate to the following sample certificate. Verify that the same fields exits and that the order of the fields is the same:
176176

177177
:::image type="content" source="media/how-to-deploy-certificates/sample-certificate.png" alt-text="Screenshot of a sample certificate.":::
178178

179179
## Test certificates you create
180180

181-
You can test certificates before deploying them to your sensors and on-premises management consoles. If you want to check the information within the certificate .csr file or private key file, use these commands:
181+
Test certificates before deploying them to your sensors and on-premises management consoles. If you want to check the information within the certificate .csr file or private key file, use these commands:
182182

183183
| **Test** | **CLI command** |
184184
|--|--|

0 commit comments

Comments
 (0)