Skip to content

Commit d4f364f

Browse files
apply review feedback
1 parent 2ddf256 commit d4f364f

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/iot-operations/discover-manage-assets/howto-configure-opcua-certificates-infrastructure.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ To connect to an asset, first you need to establish the application authenticati
4040
> [!TIP]
4141
> Typically, an OPC UA server has an interface that lets you export its application instance certificate. This interface isn't standardized. For servers such as KEPServerEx, there's a Windows-based configuration UI for certificates management. Other servers might have a web interface or use operating system folders to store the certificates. Refer to the user manual of your server to find out how to export the application instance certificate. After you have the certificate, make sure it's either DER or PEM encoded. Typically stored in files with either the .der or .crt extension. If the certificate isn't in one of those file formats, use a tool such as `openssl` to transform the certificate into the required format.
4242
43-
1. Add the OPC UA server's application instance certificate in the trusted certificates list. This list implemented as a kubernetes native secret, named: *aio-opc-ua-broker-trust-list* which is created when Azure IoT Operations is deployed.
43+
1. Add the OPC UA server's application instance certificate to the trusted certificates list. This list is implemented as a Kubernetes native secret named *aio-opc-ua-broker-trust-list* that's created when you deploy Azure IoT Operations.
4444

4545
# [Bash](#tab/bash)
4646

@@ -86,7 +86,7 @@ To trust a CA, complete the following steps:
8686
8787
1. Get the CA certificate public key encode in DER or PEM format. These certificates are typically stored in files with either the .der or .crt extension. Get the CA's CRL. This list is typically in a file with the .crl. Check the documentation for your OPC UA server for details.
8888
89-
1. Save the CA certificate and the CRL in the *aio-opc-ua-broker-trust-list* kubernetes native secret.
89+
1. Save the CA certificate and the CRL in the *aio-opc-ua-broker-trust-list* Kubernetes native secret.
9090
9191
# [Bash](#tab/bash)
9292
@@ -148,7 +148,7 @@ If your OPC UA server uses a certificate issued by a CA, but you don't want to t
148148
149149
1. Trust the OPC UA server's application instance certificate by following the first three steps in the previous section.
150150
151-
1. Besides the certificate itself, the connector for OPC UA needs the CA certificate to properly validate the issuer chain of the OPC UA server's certificate. Add the CA certificate and its certificate revocation list (CRL) to a separate list called `aio-opc-ua-broker-issuer-list` implemented as a kubernetes secret.
151+
1. Besides the certificate itself, the connector for OPC UA needs the CA certificate to properly validate the issuer chain of the OPC UA server's certificate. Add the CA certificate and its certificate revocation list (CRL) to a separate list called *aio-opc-ua-broker-issuer-list* that's implemented as a Kubernetes secret.
152152
153153
1. Save the CA certificate and the CRL in the `aio-opc-ua-broker-issuer-list` secret.
154154
@@ -251,7 +251,7 @@ The following example references the following items:
251251
252252
Like the previous examples, you use a dedicated Kubernetes secret to store the certificates and CRLs. To configure the enterprise grade application instance certificate, complete the following steps:
253253
254-
1. Save the certificates and the CRL in `aio-opc-ua-broker-client-certificate` secret by using the following command:
254+
1. Save the certificates and the CRL in the *aio-opc-ua-broker-client-certificate* secret by using the following command:
255255
256256
# [Bash](#tab/bash)
257257
@@ -277,7 +277,7 @@ Like the previous examples, you use a dedicated Kubernetes secret to store the c
277277
278278
---
279279
280-
2. If you use the CA to issue certificates for your OPC UA Broker, configure `aio-opc-ua-broker-issuer-list` secret. Use a Kubernetes client such as `kubectl` to configure the secrets `enterprise-grade-ca-1.der` and `enterprise-grade-ca-1.crl`
280+
2. If you use the CA to issue certificates for your OPC UA broker, configure the *aio-opc-ua-broker-issuer-list* secret. Use a Kubernetes client such as `kubectl` to configure the secrets *enterprise-grade-ca-1.der* and *enterprise-grade-ca-1.crl*:
281281
282282
# [Bash](#tab/bash)
283283

0 commit comments

Comments
 (0)