Skip to content

Commit fc484cc

Browse files
committed
addressing editorial feedback
1 parent ea242b9 commit fc484cc

File tree

1 file changed

+0
-7
lines changed

1 file changed

+0
-7
lines changed

articles/service-fabric/cluster-security-certificate-management.md

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -64,17 +64,10 @@ For our purposes, the first two steps in the sequence above are largely unrelate
6464
These steps are illustrated below; note the differences in provisioning between certificates declared by thumbprint and common name, respectively.
6565

6666
*Fig. 1.* Issuance and provisioning flow of certificates declared by thumbprint.
67-
<center>
68-
6967
![Provisioning certificates declared by thumbprint][Image1]
70-
</center>
7168

7269
*Fig. 2.* Issuance and provisioning flow of certificates declared by subject common name.
73-
<center>
74-
7570
![Provisioning certificates declared by subject common name][Image2]
76-
</center>
77-
7871

7972
### Certificate enrollment
8073
This topic is covered in detail in the Key Vault [documentation](../key-vault/create-certificate.md); we're including a synopsis here for continuity and easier reference. Continuing with Azure as the context, and using Azure Key Vault as the secret management service, an authorized certificate requester must have at least certificate management permissions on the vault, granted by the vault owner; the requester would then enroll into a certificate as follows:

0 commit comments

Comments
 (0)