Skip to content

Commit c386b42

Browse files
Merge pull request #300977 from PatAltimore/patricka-freshness
Freshness review
2 parents fb793eb + 0b1795a commit c386b42

File tree

1 file changed

+18
-18
lines changed

1 file changed

+18
-18
lines changed

articles/iot-edge/how-to-provision-single-device-linux-on-windows-x509.md

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -6,41 +6,41 @@ ms.service: azure-iot-edge
66
ms.custom: linux-related-content
77
services: iot-edge
88
ms.topic: how-to
9-
ms.date: 06/03/2024
9+
ms.date: 06/06/2025
1010
ms.author: patricka
1111
---
1212

1313
# Create and provision an IoT Edge for Linux on Windows device using X.509 certificates
1414

1515
[!INCLUDE [iot-edge-version-all-supported](includes/iot-edge-version-all-supported.md)]
1616

17-
This article provides end-to-end instructions for registering and provisioning an IoT Edge for Linux on Windows device.
17+
This article gives step-by-step instructions for registering and provisioning an IoT Edge for Linux on Windows device.
1818

1919

20-
Every device that connects to an IoT hub has a device ID that's used to track cloud-to-device or device-to-cloud communications. You configure a device with its connection information, which includes the IoT hub hostname, the device ID, and the information the device uses to authenticate to IoT Hub.
20+
Each device that connects to an IoT hub has a device ID that tracks cloud-to-device or device-to-cloud communications. You configure a device with its connection information, including the IoT hub hostname, device ID, and the information the device uses to authenticate to IoT Hub.
2121

22-
The steps in this article walk through a process called manual provisioning, where you connect a single device to its IoT hub. For manual provisioning, you have two options for authenticating IoT Edge devices:
22+
This article walks you through manual provisioning, where you connect a single device to its IoT hub. For manual provisioning, you can use one of two options to authenticate IoT Edge devices:
2323

24-
* **Symmetric keys**: When you create a new device identity in IoT Hub, the service creates two keys. You place one of the keys on the device, and it presents the key to IoT Hub when authenticating.
24+
* **Symmetric keys**: When you create a new device identity in IoT Hub, the service creates two keys. Place one of the keys on the device, and it presents the key to IoT Hub when authenticating.
2525

26-
This authentication method is faster to get started, but not as secure.
26+
This authentication method lets you get started faster, but isn't as secure.
2727

28-
* **X.509 self-signed**: You create two X.509 identity certificates and place them on the device. When you create a new device identity in IoT Hub, you provide thumbprints from both certificates. When the device authenticates to IoT Hub, it presents one certificate and IoT Hub verifies that the certificate matches its thumbprint.
28+
* **X.509 self-signed**: Create two X.509 identity certificates and place them on the device. When you create a new device identity in IoT Hub, provide thumbprints from both certificates. When the device authenticates to IoT Hub, it presents one certificate and IoT Hub verifies that the certificate matches its thumbprint.
2929

30-
This authentication method is more secure and recommended for production scenarios.
30+
This authentication method is more secure and is recommended for production scenarios.
3131

32-
This article covers using X.509 certificates as your authentication method. If you want to use symmetric keys, see [Create and provision an IoT Edge for Linux on Windows device using symmetric keys](how-to-provision-single-device-linux-on-windows-symmetric.md).
32+
This article covers using X.509 certificates as the authentication method. To use symmetric keys, see [Create and provision an IoT Edge for Linux on Windows device using symmetric keys](how-to-provision-single-device-linux-on-windows-symmetric.md).
3333

3434
> [!NOTE]
35-
> If you have many devices to set up and don't want to manually provision each one, use one of the following articles to learn how IoT Edge works with the IoT Hub device provisioning service:
35+
> If you need to set up many devices and don't want to manually provision each one, use one of the following articles to learn how IoT Edge works with the IoT Hub device provisioning service:
3636
>
3737
> * [Create and provision IoT Edge devices at scale using X.509 certificates](how-to-provision-devices-at-scale-linux-on-windows-x509.md)
3838
> * [Create and provision IoT Edge devices at scale with a TPM](how-to-provision-devices-at-scale-linux-on-windows-tpm.md)
3939
> * [Create and provision IoT Edge devices at scale using symmetric keys](how-to-provision-devices-at-scale-linux-on-windows-symmetric.md)
4040
4141
## Prerequisites
4242

43-
This article covers registering your IoT Edge device and installing IoT Edge for Linux on Windows. These tasks have different prerequisites and utilities used to accomplish them. Make sure you have all the prerequisites covered before proceeding.
43+
This article covers how to register your IoT Edge device and install IoT Edge for Linux on Windows. These tasks have different prerequisites and use different utilities. Check that you meet all prerequisites before you continue.
4444

4545
<!-- Device registration prerequisites H3 and content -->
4646
[!INCLUDE [iot-edge-prerequisites-register-device.md](includes/iot-edge-prerequisites-register-device.md)]
@@ -59,11 +59,11 @@ This article covers registering your IoT Edge device and installing IoT Edge for
5959

6060
## Provision the device with its cloud identity
6161

62-
You're ready to set up your device with its cloud identity and authentication information.
62+
Set up your device with its cloud identity and authentication information.
6363

6464
To provision your device using X.509 certificates, you need your **IoT hub name**, **device ID**, and the absolute paths to your **identity certificate** and **private key** on your Windows host machine.
6565

66-
Have the device identity certificate and its matching private key ready on your target device. Know the absolute path to both files.
66+
Make sure the device identity certificate and its matching private key are on your target device. Know the absolute path to both files.
6767

6868
Run the following command in an elevated PowerShell session on your target device. Replace the placeholder text with your own values.
6969

@@ -86,7 +86,7 @@ Verify that IoT Edge for Linux on Windows was successfully installed and configu
8686
>[!NOTE]
8787
>The only account allowed to SSH to the virtual machine is the user that created it.
8888
89-
1. Once you are logged in, you can check the list of running IoT Edge modules using the following Linux command:
89+
1. Once you're logged in, you can check the list of running IoT Edge modules using the following Linux command:
9090

9191
```bash
9292
sudo iotedge list
@@ -107,21 +107,21 @@ Verify that IoT Edge for Linux on Windows was successfully installed and configu
107107
```
108108

109109
>[!NOTE]
110-
>On a newly provisioned device, you may see an error related to IoT Edge Hub:
110+
>On a newly provisioned device, you can see an error related to IoT Edge Hub:
111111
>
112112
>**× production readiness: Edge Hub's storage directory is persisted on the host filesystem - Error**
113113
>
114114
>**Could not check current state of edgeHub container**
115115
>
116-
>This error is expected on a newly provisioned device because the IoT Edge Hub module isn't running. To resolve the error, in IoT Hub, set the modules for the device and create a deployment. Creating a deployment for the device starts the modules on the device including the IoT Edge Hub module.
116+
>This error is expected on a new device because the IoT Edge Hub module isn't running. To fix the error, in IoT Hub, set the modules for the device and create a deployment. Creating a deployment starts the modules on the device, including the IoT Edge Hub module.
117117

118-
When you create a new IoT Edge device, it displays the status code `417 -- The device's deployment configuration is not set` in the Azure portal. This status is normal, and means that the device is ready to receive a module deployment.
118+
When you create a new IoT Edge device, it shows the status code `417 -- The device's deployment configuration is not set` in the Azure portal. This status is normal and means the device is ready to receive a module deployment.
119119
120120
<!-- Uninstall IoT Edge for Linux on Windows H2 and content -->
121121
[!INCLUDE [uninstall-iot-edge-linux-on-windows.md](includes/iot-edge-uninstall-linux-on-windows.md)]
122122
123123
## Next steps
124124
125-
* Continue to [deploy IoT Edge modules](how-to-deploy-modules-portal.md) to learn how to deploy modules onto your device.
125+
* Continue to [deploy IoT Edge modules](how-to-deploy-modules-portal.md) to learn how to deploy modules on your device.
126126
* Learn how to [manage certificates on your IoT Edge for Linux on Windows virtual machine](how-to-manage-device-certificates.md) and transfer files from the host OS to your Linux virtual machine.
127127
* Learn how to [configure your IoT Edge devices to communicate through a proxy server](how-to-configure-proxy-support.md).

0 commit comments

Comments
 (0)