Skip to content

Commit f2bfd16

Browse files
committed
Minor Acrolinx fixes to improve score
1 parent d297cfb commit f2bfd16

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/iot-hub/tutorial-x509-openssl.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.custom: [mvc, 'Role: Cloud Development', 'Role: Data Analytics']
1616

1717
Although you can purchase X.509 certificates from a trusted certification authority, creating your own test certificate hierarchy is adequate for testing IoT Hub device authentication.
1818

19-
The following example uses [OpenSSL](https://www.openssl.org/) and the [OpenSSL Cookbook](https://www.feistyduck.com/library/openssl-cookbook/online/ch-openssl.html) to create a certification authority (CA), a subordinate CA, and a device certificate. The example then signs the subordinate CA and the device certificate into a certificate hierarchy. This is presented for example purposes only.
19+
The following example uses [OpenSSL](https://www.openssl.org/) and the [OpenSSL Cookbook](https://www.feistyduck.com/library/openssl-cookbook/online/ch-openssl.html) to create a certification authority (CA), a subordinate CA, and a device certificate. The example then signs the subordinate CA and the device certificate into a certificate hierarchy. This example is presented for demonstration purposes only.
2020

2121
https://github.com/Azure/azure-iot-sdk-c/blob/main/tools/CACertificates/CACertificateOverview.md
2222

@@ -28,7 +28,7 @@ https://github.com/Azure/azure-iot-sdk-c/blob/main/tools/CACertificates/CACertif
2828
Create a directory structure for the certification authority.
2929

3030
* The *certs* directory stores new certificates.
31-
* The *db* directory is used for the certificate database.
31+
* The *db* directory stores the certificate database.
3232
* The *private* directory stores the CA private key.
3333

3434
```bash
@@ -119,7 +119,7 @@ First, generate a private key and the certificate signing request (CSR) in the *
119119
openssl req -new -config rootca.conf -out rootca.csr -keyout private/rootca.key
120120
```
121121

122-
Next, create a self-signed CA certificate. Self-signing is suitable for testing purposes. Specify the `ca_ext` configuration file extensions on the command line. These indicate that the certificate is for a root CA and can be used to sign certificates and certificate revocation lists (CRLs). Sign the certificate, and commit it to the database.
122+
Next, create a self-signed CA certificate. Self-signing is suitable for testing purposes. Specify the `ca_ext` configuration file extensions on the command line. These extensions indicate that the certificate is for a root CA and can be used to sign certificates and certificate revocation lists (CRLs). Sign the certificate, and commit it to the database.
123123

124124
```bash
125125
openssl ca -selfsign -config rootca.conf -in rootca.csr -out rootca.crt -extensions ca_ext
@@ -210,7 +210,7 @@ subjectKeyIdentifier = hash
210210

211211
## Step 6 - Create a subordinate CA
212212

213-
This example shows you how to create a subordinate or registration CA. Because you can use the root CA to sign certificates, creating a subordinate CA isn’t strictly necessary. Having a subordinate CA does, however, mimic real world certificate hierarchies in which the root CA is kept offline and subordinate CAs issue client certificates.
213+
This example shows you how to create a subordinate or registration CA. Because you can use the root CA to sign certificates, creating a subordinate CA isn’t strictly necessary. Having a subordinate CA does, however, mimic real world certificate hierarchies in which the root CA is kept offline and a subordinate CA issues client certificates.
214214

215215
From the *subca* directory, use the configuration file to generate a private key and a certificate signing request (CSR).
216216

0 commit comments

Comments
 (0)