You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
1. Copy the disconnected operations installation files (appliance and manifest) to the first machine. Save these files into the base folder you created earlier.
@@ -222,11 +222,11 @@ To prepare the first machine for the disconnected operations appliance, follow t
1. Verify the certificates, public key, and management endpoint. You should have two folders: `ManagementEndpointCerts` and `IngressEndpointCerts` and at least 24 certificates.
225
+
1. Verify the certificates, public key, and management endpoint. You should have two folders: `ManagementEndpointCerts` and `IngressEndpointsCerts` and at least 24 certificates.
226
226
227
227
```powershell
228
228
Get-ChildItem $certsPath
229
-
Get-Item $certsPath -recurse -filter *.cer
229
+
Get-ChildItem $certsPath -recurse -filter *.cer
230
230
```
231
231
232
232
1. Install the BitLocker feature including the management tool.
@@ -238,9 +238,9 @@ To prepare the first machine for the disconnected operations appliance, follow t
238
238
1. Import the **Operations module**. Run the command as an administrator using PowerShell. Modify the path to match your folder structure.
Before you install the appliance, validate the management endpoint certificates. Ensure that the certificate has a validated certificate chain, isn't expired, has the correct subject, the appropriate enhanced key usage (EKUs), and the supported cryptography.
if ($sanList -inotcontains "DNS Name=$HostName") {
373
-
throw "Subject Alternative Name does not contain the hostname $HostName. It only has Subject Alternative Name: $sanExtensionContent. Correct the certificate and try again."
Copy file name to clipboardExpand all lines: azure-local/manage/disconnected-operations-pki.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -85,11 +85,11 @@ On the host machine or Active Directory virtual machine (VM), follow the steps i
85
85
You need these certificates to deploy the disconnected operations appliance. You also need the public key for your local infrastructure to provide a secure trust chain.
86
86
87
87
> [!NOTE]
88
-
> **IngressEndpointCerts** is the folder where you store all 24 certificate files. **IngressEndpointPassword** is a secure string with the certificate password.
88
+
> **IngressEndpointsCerts** is the folder where you store all 24 certificate files. **IngressEndpointPassword** is a secure string with the certificate password.
89
89
90
90
1. Connect to the CA.
91
91
1. Create a folder named **IngressEndpointsCerts**. Use this folder to store all certificates.
92
-
1. Create the 24 certs in the table above and export them into the IngressEndpointCerts folder.
92
+
1. Create the 24 certs in the table above and export them into the IngressEndpointsCerts folder.
93
93
94
94
Here's an example script you can modify and run. It creates ingress certificates and exports them to the configured folder by creating CSRs and issuing them to your CA.
95
95
@@ -206,7 +206,7 @@ $AzLCerts = @(
206
206
}
207
207
```
208
208
209
-
- Copy the original certificates (24 .pfx files / *.pfx) obtained from your CA to the directory structure represented in IngressEndpointCerts.
209
+
- Copy the original certificates (24 .pfx files / *.pfx) obtained from your CA to the directory structure represented in IngressEndpointsCerts.
210
210
211
211
### Management endpoint
212
212
@@ -294,7 +294,7 @@ _continue_ = "DNS=$subject"
294
294
You need the root certificate public key for deployment. The following example shows how to export your root certificate public key:
For more information, see [Active Directory Certificate Services](/troubleshoot/windows-server/certificates-and-public-key-infrastructure-pki/export-root-certification-authority-certificate).
0 commit comments