You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
1. Copy the disconnected operations installation files (appliance and manifest) to the first machine. Save these files into the base folder you created earlier.
@@ -222,7 +222,7 @@ To prepare the first machine for the disconnected operations appliance, follow t
1. Verify the certificates, public key, and management endpoint. You should have two folders: `ManagementEndpointCerts` and `IngressEndpointCerts` and at least 24 certificates.
225
+
1. Verify the certificates, public key, and management endpoint. You should have two folders: `ManagementEndpointCerts` and `IngressEndpointsCerts` and at least 24 certificates.
226
226
227
227
```powershell
228
228
Get-ChildItem $certsPath
@@ -240,7 +240,7 @@ To prepare the first machine for the disconnected operations appliance, follow t
Before you install the appliance, validate the management endpoint certificates. Ensure that the certificate has a validated certificate chain, isn't expired, has the correct subject, the appropriate enhanced key usage (EKUs), and the supported cryptography.
if ($sanList -inotcontains "DNS Name=$HostName") {
373
-
throw "Subject Alternative Name does not contain the hostname $HostName. It only has Subject Alternative Name: $sanExtensionContent. Correct the certificate and try again."
Copy file name to clipboardExpand all lines: azure-local/manage/disconnected-operations-pki.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -85,11 +85,11 @@ On the host machine or Active Directory virtual machine (VM), follow the steps i
85
85
You need these certificates to deploy the disconnected operations appliance. You also need the public key for your local infrastructure to provide a secure trust chain.
86
86
87
87
> [!NOTE]
88
-
> **IngressEndpointCerts** is the folder where you store all 24 certificate files. **IngressEndpointPassword** is a secure string with the certificate password.
88
+
> **IngressEndpointsCerts** is the folder where you store all 24 certificate files. **IngressEndpointPassword** is a secure string with the certificate password.
89
89
90
90
1. Connect to the CA.
91
91
1. Create a folder named **IngressEndpointsCerts**. Use this folder to store all certificates.
92
-
1. Create the 24 certs in the table above and export them into the IngressEndpointCerts folder.
92
+
1. Create the 24 certs in the table above and export them into the IngressEndpointsCerts folder.
93
93
94
94
Here's an example script you can modify and run. It creates ingress certificates and exports them to the configured folder by creating CSRs and issuing them to your CA.
95
95
@@ -206,7 +206,7 @@ $AzLCerts = @(
206
206
}
207
207
```
208
208
209
-
- Copy the original certificates (24 .pfx files / *.pfx) obtained from your CA to the directory structure represented in IngressEndpointCerts.
209
+
- Copy the original certificates (24 .pfx files / *.pfx) obtained from your CA to the directory structure represented in IngressEndpointsCerts.
0 commit comments