Skip to content

Commit aac76a1

Browse files
committed
Fix link path
1 parent 11581ed commit aac76a1

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

includes/iot-authentication-device-connection-string.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,4 +7,4 @@ ms.date: 08/28/2024
77
---
88

99
>[!IMPORTANT]
10-
>This article includes steps to connect a device using a shared access signature, also called symmetric key authentication. This authentication method is convenient for testing and evaluation, but authenticating a device using X.509 certificates is a more secure approach. To learn more, see [Security best practices > Connection security](../articles/articles/iot/iot-overview-security.md#connection-security).
10+
>This article includes steps to connect a device using a shared access signature, also called symmetric key authentication. This authentication method is convenient for testing and evaluation, but authenticating a device using X.509 certificates is a more secure approach. To learn more, see [Security best practices > Connection security](../articles/iot/iot-overview-security.md#connection-security).

includes/iot-authentication-service-connection-string.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,4 +7,4 @@ ms.date: 08/28/2024
77
---
88

99
>[!IMPORTANT]
10-
>This article includes steps to connect to a service using a shared access signature. This authentication method is convenient for testing and evaluation, but authenticating to a service with Microsoft Entra ID or managed identities is a more secure approach. To learn more, see [Security best practices > Cloud security](../articles/articles/iot/iot-overview-security.md#cloud-security).
10+
>This article includes steps to connect to a service using a shared access signature. This authentication method is convenient for testing and evaluation, but authenticating to a service with Microsoft Entra ID or managed identities is a more secure approach. To learn more, see [Security best practices > Cloud security](../articles/iot/iot-overview-security.md#cloud-security).

0 commit comments

Comments
 (0)