Skip to content

Commit 97e07ca

Browse files
asergazdominicbetts
authored andcommitted
cross-links
1 parent 0f4edc0 commit 97e07ca

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

articles/iot-operations/connect-to-cloud/howto-configure-mqtt-endpoint.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ The default endpoint uses the following settings:
3838
- Host: `aio-broker:18883` through the [default MQTT broker listener](../manage-mqtt-broker/howto-configure-brokerlistener.md#default-brokerlistener)
3939
- Authentication: service account token (SAT) through the [default BrokerAuthentication resource](../manage-mqtt-broker/howto-configure-authentication.md#default-brokerauthentication-resource)
4040
- TLS: Enabled
41-
- Trusted CA certificate: The default CA certificate `azure-iot-operations-aio-ca-trust-bundle` from the [default root CA](../secure-iot-ops/howto-manage-certificates.md)
41+
- Trusted CA certificate: The default CA certificate `azure-iot-operations-aio-ca-trust-bundle` from the [default root CA](../secure-iot-ops/howto-manage-certificates.md#default-self-signed-issuer-and-root-ca-certificate-for-tls-server-certificates)
4242

4343
> [!CAUTION]
4444
> Don't delete the default endpoint. If you delete the default endpoint, you must recreate it with the same settings.

articles/iot-operations/discover-manage-assets/howto-configure-opcua-certificates-infrastructure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Based on the [OPC UA specification](https://reference.opcfoundation.org/), the c
2020

2121
The connector for OPC UA must trust the OPC UA servers it connects to. The connector maintains a list of trusted certificates. To learn more, see:
2222

23-
- [Certificate management for Azure IoT Operations](../secure-iot-ops/howto-manage-certificates.md) - this article describes how Azure IoT Operations uses Azure Key Vault to manage certificates.
23+
- [Manage certificates for your Azure IoT Operations deployment](../secure-iot-ops/howto-manage-certificates.md) - this article describes how Azure IoT Operations uses Azure Key Vault to manage certificates.
2424
- [OPC UA certificates infrastructure for the connector for OPC UA](overview-opcua-broker-certificates-management.md) - this article describes the roles of the trusted certificates list and issuer certificates list.
2525

2626
## Prerequisites

articles/iot-operations/manage-mqtt-broker/howto-configure-brokerlistener.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -750,7 +750,7 @@ Remember to specify authentication methods if needed.
750750

751751
### Default root CA and issuer
752752

753-
To help you get started, IoT Operations is deployed with a default "quickstart" CA certificate and issuer for TLS server certificates. You can use this issuer for development and testing. For more information, see [Default root CA and issuer for TLS server certificates](../secure-iot-ops/howto-manage-certificates.md).
753+
To help you get started, IoT Operations is deployed with a default "quickstart" CA certificate and issuer for TLS server certificates. You can use this issuer for development and testing. For more information, see [Default root CA and issuer for TLS server certificates](../secure-iot-ops/howto-manage-certificates.md#default-self-signed-issuer-and-root-ca-certificate-for-tls-server-certificates).
754754

755755
For production, you must configure a CA issuer with a certificate from a trusted CA, as described in the previous sections.
756756

0 commit comments

Comments
 (0)