Skip to content

Commit ad81c82

Browse files
committed
Complete article draft
1 parent 5d9b984 commit ad81c82

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/iot-dps/concepts-device-oem-security-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -176,7 +176,7 @@ Cons for shared symmetric key:
176176
- You will likely lose control of devices if you rely on shared symmetric key.
177177

178178
### Making the right choice for your devices
179-
To choose an authentication method, make sure you consider the benefits and costs of each approach for your unique manufacturing process. For device authentication, usually there's an inverse relationship between how secure a given approach is, and how convenient it is. This article surveyed the main issues and recommended best practices.
179+
To choose an authentication method, make sure you consider the benefits and costs of each approach for your unique manufacturing process. For device authentication, usually there's an inverse relationship between how secure a given approach is, and how convenient it is. This article surveyed the main issues and recommended best practices. xx
180180

181181
In addition, Azure IoT provides other resources to help with selecting secure hardware, and creating secure IoT deployments:
182182
- Azure IoT [security recommendations](../iot-fundamentals/security-recommendations.md) to guide the deployment process.

0 commit comments

Comments
 (0)