Skip to content

Commit c90de4f

Browse files
committed
Freshness review
1 parent c386b42 commit c90de4f

File tree

1 file changed

+14
-14
lines changed

1 file changed

+14
-14
lines changed

articles/iot-edge/how-to-provision-devices-at-scale-linux-on-windows-symmetric.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Create and provision IoT Edge devices using symmetric keys on Linux on Wi
33
description: Use symmetric key attestation to test provisioning Linux on Windows devices at scale for Azure IoT Edge with device provisioning service
44
author: PatAltimore
55
ms.author: patricka
6-
ms.date: 06/03/2024
6+
ms.date: 06/06/2025
77
ms.topic: how-to
88
ms.service: azure-iot-edge
99
ms.custom: linux-related-content
@@ -14,15 +14,15 @@ services: iot-edge
1414

1515
[!INCLUDE [iot-edge-version-all-supported](includes/iot-edge-version-all-supported.md)]
1616

17-
This article shows how to autoprovision one or more [IoT Edge for Linux on Windows](iot-edge-for-linux-on-windows.md) devices using symmetric keys. You can automatically provision Azure IoT Edge devices with the [Azure IoT Hub device provisioning service](../iot-dps/index.yml) (DPS). If you're unfamiliar with the process of autoprovisioning, review the [provisioning overview](../iot-dps/about-iot-dps.md#provisioning-process) before continuing.
17+
This article shows how to autoprovision one or more [IoT Edge for Linux on Windows](iot-edge-for-linux-on-windows.md) devices using symmetric keys. Automatically provision Azure IoT Edge devices with the [Azure IoT Hub device provisioning service](../iot-dps/index.yml) (DPS). If you're unfamiliar with the process of autoprovisioning, review the [provisioning overview](../iot-dps/about-iot-dps.md#provisioning-process) before continuing.
1818

1919

20-
The tasks are as follows:
20+
Here are the tasks:
2121

2222
1. Create either an **individual enrollment** for a single device or a **group enrollment** for a set of devices.
2323
1. Deploy a Linux virtual machine with the IoT Edge runtime installed and connect it to the IoT Hub.
2424

25-
Symmetric key attestation is a simple approach to authenticating a device with a device provisioning service instance. This attestation method represents a "Hello world" experience for developers who are new to device provisioning, or do not have strict security requirements. Device attestation using a [TPM](../iot-dps/concepts-tpm-attestation.md) or [X.509 certificates](../iot-dps/concepts-x509-attestation.md) is more secure, and should be used for more stringent security requirements.
25+
Symmetric key attestation is a simple way to authenticate a device with a device provisioning service instance. This attestation method is a "Hello world" experience for developers who are new to device provisioning or don't have strict security requirements. Device attestation using a [TPM](../iot-dps/concepts-tpm-attestation.md) or [X.509 certificates](../iot-dps/concepts-x509-attestation.md) is more secure, and you should use it for more stringent security requirements.
2626

2727
## Prerequisites
2828

@@ -40,13 +40,13 @@ Symmetric key attestation is a simple approach to authenticating a device with a
4040

4141
## Provision the device with its cloud identity
4242

43-
Once the runtime is installed on your device, configure the device with the information it uses to connect to the device provisioning service and IoT Hub.
43+
After you install the runtime on your device, configure the device with the information it uses to connect to the device provisioning service and IoT Hub.
4444

45-
Have the following information ready:
45+
Make sure you have the following information:
4646

4747
* The DPS **ID Scope** value
4848
* The device **Registration ID** you created
49-
* Either the **Primary Key** from an individual enrollment, or a [derived key](#derive-a-device-key) for devices using a group enrollment.
49+
* The **Primary Key** from an individual enrollment, or a [derived key](#derive-a-device-key) for devices using a group enrollment.
5050

5151
Run the following command in an elevated PowerShell session with the placeholder values updated with your own values:
5252

@@ -56,15 +56,15 @@ Provision-EflowVm -provisioningType DpsSymmetricKey -scopeId PASTE_YOUR_ID_SCOPE
5656

5757
## Verify successful installation
5858

59-
Verify that IoT Edge for Linux on Windows was successfully installed and configured on your IoT Edge device.
59+
Check that IoT Edge for Linux on Windows is installed and set up on your IoT Edge device.
6060

6161
# [Individual enrollment](#tab/individual-enrollment)
6262

63-
You can verify that the individual enrollment that you created in device provisioning service was used. Navigate to your device provisioning service instance in the Azure portal. Open the enrollment details for the individual enrollment that you created. Notice that the status of the enrollment is **assigned** and the device ID is listed.
63+
Check that the individual enrollment you created in device provisioning service is used. Go to your device provisioning service instance in the Azure portal. Open the enrollment details for the individual enrollment you created. The status of the enrollment is **assigned**, and the device ID is listed.
6464

6565
# [Group enrollment](#tab/group-enrollment)
6666

67-
You can verify that the group enrollment that you created in device provisioning service was used. Navigate to your device provisioning service instance in the Azure portal. Open the enrollment details for the group enrollment that you created. Go to the **Registration Records** tab to view all devices registered in that group.
67+
Check that the group enrollment you created in device provisioning service is used. Go to your device provisioning service instance in the Azure portal. Open the enrollment details for the group enrollment you created. Go to the **Registration Records** tab to view all devices registered in that group.
6868

6969
---
7070

@@ -77,7 +77,7 @@ You can verify that the group enrollment that you created in device provisioning
7777
>[!NOTE]
7878
>The only account allowed to SSH to the virtual machine is the user that created it.
7979
80-
1. Once you are logged in, you can check the list of running IoT Edge modules using the following Linux command:
80+
1. Once you're logged in, you can check the list of running IoT Edge modules using the following Linux command:
8181

8282
```bash
8383
sudo iotedge list
@@ -104,16 +104,16 @@ You can verify that the group enrollment that you created in device provisioning
104104
>
105105
>**Could not check current state of edgeHub container**
106106
>
107-
>This error is expected on a newly provisioned device because the IoT Edge Hub module isn't running. To resolve the error, in IoT Hub, set the modules for the device and create a deployment. Creating a deployment for the device starts the modules on the device including the IoT Edge Hub module.
107+
>This error is expected on a newly provisioned device because the IoT Edge Hub module isn't running. To fix the error, in IoT Hub, set the modules for the device and create a deployment. Creating a deployment for the device starts the modules on the device, including the IoT Edge Hub module.
108108

109-
When you create a new IoT Edge device, it displays the status code `417 -- The device's deployment configuration is not set` in the Azure portal. This status is normal, and means that the device is ready to receive a module deployment.
109+
When you create a new IoT Edge device, it shows the status code `417 -- The device's deployment configuration is not set` in the Azure portal. This status is normal and means the device is ready to receive a module deployment.
110110
111111
<!-- Uninstall IoT Edge for Linux on Windows H2 and content -->
112112
[!INCLUDE [uninstall-iot-edge-linux-on-windows.md](includes/iot-edge-uninstall-linux-on-windows.md)]
113113
114114
## Next steps
115115
116-
The device provisioning service enrollment process lets you set the device ID and device twin tags at the same time as you provision the new device. You can use those values to target individual devices or groups of devices using automatic device management. Learn how to [Deploy and monitor IoT Edge modules at scale using the Azure portal](how-to-deploy-at-scale.md) or [using Azure CLI](how-to-deploy-cli-at-scale.md).
116+
The device provisioning service enrollment process lets you set the device ID and device twin tags when you provision a new device. Use those values to target individual devices or groups of devices with automatic device management. Learn how to [deploy and monitor IoT Edge modules at scale using the Azure portal](how-to-deploy-at-scale.md) or [using Azure CLI](how-to-deploy-cli-at-scale.md).
117117
118118
You can also:
119119

0 commit comments

Comments
 (0)