You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-edge/how-to-connect-downstream-iot-edge-device.md
-26Lines changed: 0 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -142,19 +142,6 @@ To enable secure connections, every IoT Edge parent device in a gateway scenario
142
142
143
143
01. Transfer the **root CA certificate**, **parent device CA certificate**, and **parent private key** to the parent device. The examples in this article use the directory `/var/secrets` for the certificates and keys directory.
144
144
145
-
01. Set the following permissions for each certificate and key on the device.
146
-
* The service user **aziotcs** has read permissions for the directories holding the certificates and keys.
147
-
* The device private key file is owned by the **aziotks** group.
148
-
* The device certificate file is owned by the **aziotcs** group.
149
-
150
-
Example output from `ls -l` command.
151
-
152
-
```output
153
-
-r--r--r-- 1 aziotcs root 1984 May 3 17:24 azure-iot-test-only.root.ca.cert.pem
154
-
-r--r--r-- 1 aziotcs root 1923 May 3 17:28 iot-edge-device-ca-gateway.cert.pem
155
-
-r--r--r-- 1 aziotks root 3243 May 3 17:28 iot-edge-device-ca-gateway.key.pem
156
-
```
157
-
158
145
01. Install the **root CA certificate** on the parent IoT Edge device. First, copy the root certificate into the certificate directory and add `.crt` to the end of the file name. Next, update the certificate store on the device using the platform-specific command.
159
146
160
147
**Debian or Ubuntu:**
@@ -325,19 +312,6 @@ To enable secure connections, every IoT Edge child device in a gateway scenario
325
312
326
313
01. Transfer the **root CA certificate**, **child device CA certificate**, and **child private key** to the child device. The examples in this article use the directory `/var/secrets` for the certificates and keys directory.
327
314
328
-
01. Set the following permissions for each certificate and key on the device.
329
-
* The service user **aziotcs** has read permissions for the directories holding the certificates and keys.
330
-
* The device private key file is owned by the **aziotks** group.
331
-
* The device certificate file is owned by the **aziotcs** group.
332
-
333
-
Example output from `ls -l` command.
334
-
335
-
```output
336
-
-r--r--r-- 1 aziotcs root 1984 May 3 17:24 azure-iot-test-only.root.ca.cert.pem
337
-
-r--r--r-- 1 aziotcs root 1923 May 3 17:28 iot-edge-device-ca-downstream.cert.pem
338
-
-r--r--r-- 1 aziotks root 3243 May 3 17:28 iot-edge-device-ca-downstream.key.pem
339
-
```
340
-
341
315
01. Install the **root CA certificate** on the child IoT Edge device. First, copy the root certificate into the certificate directory and add `.crt` to the end of the file name. Next, update the certificate store on the device using the platform-specific command.
0 commit comments