Skip to content

Commit 05b6d16

Browse files
committed
Merge branch '04-15-26-iot-hub-rmv-ps' of https://github.com/cwatson-cat/azure-docs-pr into 04-15-26-iot-hub-rmv-ps
2 parents 9ef1c37 + 556fc5c commit 05b6d16

6 files changed

Lines changed: 20 additions & 20 deletions

articles/iot-hub/how-to-configure-credential.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: azure-iot-hub
88
services: iot-hub
99
ms.topic: how-to
1010
ai-usage: ai-generated
11-
ms.date: 03/11/2026
11+
ms.date: 04/14/2026
1212
#Customer intent: As a developer setting up certificate management, I want to configure a root CA credential in my ADR namespace.
1313
---
1414

@@ -61,15 +61,15 @@ Follow these steps to configure your root CA credential.
6161

6262
1. In the resource menu, select **Namespaces**, and then select your ADR namespace from the list.
6363

64-
1. In the resource menu of your ADR namespace, select **Certificate management (Preview)** under **Namespace resources**.
64+
1. In the resource menu of your ADR namespace, select **Credential policies (Preview)** under **Namespace resources**.
6565

66-
1. On the **Certificate management (Preview)** page, select **Enable** from the **Enable certificate management** dialog.
66+
1. On the **Credential policies (Preview)** page, select **Enable** from the **Enable certificate management** dialog.
6767

6868
:::image type="content" source="./media/how-to-configure-credential/enable-certificate-management.png" alt-text="Screenshot of the Certificate management page for an Azure Device Registry namespace in the Azure portal, highlighting the Enable button in the Enable certificate management dialog." lightbox="./media/how-to-configure-credential/enable-certificate-management.png":::
6969

7070
1. Azure provisions a root CA credential for your namespace. This process takes a few moments to complete.
7171

72-
1. After provisioning is complete, your root CA credential is ready to use. The credential is displayed on the **Certificate management (Preview)** page.
72+
1. After provisioning is complete, your root CA credential is ready to use. The credential is displayed on the **Credential policies (Preview)** page.
7373

7474
# [Azure CLI](#tab/cli)
7575

articles/iot-hub/how-to-create-policy-external-certificate.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: cwatson
77
ms.service: azure-iot-hub
88
services: iot-hub
99
ms.topic: how-to
10-
ms.date: 04/16/2026
10+
ms.date: 04/14/2026
1111
ai-usage: ai-generated
1212
#Customer intent: As an IoT administrator, I want to create or edit an external CA policy in Azure Device Registry so I can issue and manage device certificates by using my external CA lifecycle.
1313
---
@@ -70,11 +70,11 @@ Create a policy that uses your external CA, and then activate it after you uploa
7070

7171
1. Open your **Azure Device Registry** namespace.
7272

73-
1. In the sidebar menu, under **Namespace resources**, select **Certificate management**.
73+
1. In the sidebar menu, under **Namespace resources**, select **Credential policies**.
7474

7575
1. Select **Create Policy**.
7676

77-
:::image type="content" source="media/how-to-create-policy-external-certificate/certificate-management.png" alt-text="Screenshot showing the certificate management pane.":::
77+
:::image type="content" source="media/how-to-create-policy-external-certificate/certificate-management.png" alt-text="Screenshot showing the Credential policies pane.":::
7878

7979
1. In the **Basics** tab, complete the fields as follows:
8080

@@ -107,7 +107,7 @@ Create a policy that uses your external CA, and then activate it after you uploa
107107

108108
Update the validity period for an existing external CA policy when certificate lifetime requirements change.
109109

110-
1. In the sidebar menu of your Device Registry namespace, under **Namespace resources**, select **Certificate management**.
110+
1. In the sidebar menu of your Device Registry namespace, under **Namespace resources**, select **Credential policies**.
111111

112112
1. Select the policy that you want to edit.
113113

@@ -121,7 +121,7 @@ Update the validity period for an existing external CA policy when certificate l
121121

122122
Synchronize your new or updated policy.
123123

124-
1. In the sidebar menu of your Device Registry namespace, under **Namespace resources**, select **Certificate management**.
124+
1. In the sidebar menu of your Device Registry namespace, under **Namespace resources**, select **Credential policies**.
125125

126126
1. Select **Sync all**, and then **Yes**.
127127

articles/iot-hub/how-to-create-policy.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: azure-iot-hub
88
services: iot-hub
99
ms.topic: how-to
1010
ai-usage: ai-generated
11-
ms.date: 04/10/2026
11+
ms.date: 04/14/2026
1212
#Customer intent: As an IoT administrator, I want to create or edit a policy in Azure Device Registry so I can issue Microsoft-backed X.509 device certificates with the validity period my deployment requires.
1313
---
1414

@@ -51,11 +51,11 @@ You can create a policy by using the Azure portal or the Azure CLI. In this prev
5151

5252
1. Open your **Azure Device Registry** namespace.
5353

54-
1. In the sidebar menu, under **Namespace resources**, select **Certificate management**.
54+
1. In the sidebar menu, under **Namespace resources**, select **Credential policies**.
5555

5656
1. Select **Create Policy**.
5757

58-
:::image type="content" source="media/how-to-create-policy/certificate-management.png" alt-text="Screenshot showing the certificate management pane.":::
58+
:::image type="content" source="media/how-to-create-policy/certificate-management.png" alt-text="Screenshot showing the Credential policies pane.":::
5959

6060
1. In the **Basics** tab, complete the fields as follows:
6161

@@ -75,7 +75,7 @@ You can create a policy by using the Azure portal or the Azure CLI. In this prev
7575

7676
Edit an existing policy to update its validity period when security or operational requirements change.
7777

78-
1. In the sidebar menu of your ADR namespace, under **Namespace resources**, select **Certificate management**.
78+
1. In the sidebar menu of your ADR namespace, under **Namespace resources**, select **Credential policies**.
7979

8080
1. Select the policy that you want to edit.
8181

@@ -91,7 +91,7 @@ Edit an existing policy to update its validity period when security or operation
9191

9292
Synchronize your new or updated policy.
9393

94-
1. In the sidebar menu of your ADR namespace, under **Namespace resources**, select **Certificate management**.
94+
1. In the sidebar menu of your ADR namespace, under **Namespace resources**, select **Credential policies**.
9595

9696
1. Select **Sync all**, and then **Yes**.
9797

articles/iot-hub/how-to-revoke-certificate-delete-policy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -67,15 +67,15 @@ For a policy that uses an external root, you cannot revoke the policy on Azure D
6767
Use these steps to remove a policy when you no longer need it for certificate issuance.
6868

6969
1. Open your **Azure Device Registry** namespace.
70-
1. Under **Namespace resources** on the sidebar menu, select **Credential Policies**.
70+
1. Under **Namespace resources** on the sidebar menu, select **Credential policies**.
7171
1. Select the target policy.
7272
1. Select **Delete policy**, and confirm the operation.
7373

7474
## Delete a credential resource
7575

7676
Use these steps to remove a credential resource when you need to retire that certificate path.
7777

78-
1. Open **Credential Policies** in your Azure Device Registry namespace.
78+
1. Open **Credential policies** in your Device Registry namespace.
7979
1. Select the credential resource.
8080
1. Select **Delete**, and confirm the delete operation.
8181

articles/iot-hub/iot-hub-device-registry-setup.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: cwatson
77
ms.service: azure-iot-hub
88
services: iot-hub
99
ms.topic: how-to
10-
ms.date: 04/10/2026
10+
ms.date: 04/15/2026
1111
zone_pivot_groups: service-portal-azcli
1212
#Customer intent: As a developer new to IoT, I want to understand what Azure Device Registry is and how it can help me manage my IoT devices.
1313
---

includes/iot-hub-device-registry-portal.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -107,13 +107,13 @@ Repeat these steps to assign the **Azure Device Registry Contributor** role:
107107

108108
Create custom policies within your ADR namespace to define how certificates are issued and managed for your devices. Policies allow you to set parameters such as certificate validity periods and subjects. Editing or disabling a policy isn't supported in preview.
109109

110-
1. In the ADR namespace you created, under **Namespace resources**, select **Certificate management (Preview)**.
110+
1. In the ADR namespace you created, under **Namespace resources**, select **Credential policies (Preview)**.
111111

112112
In the **Enable certificate management** dialog, select **Enable**.
113113

114114
:::image type="content" source="../articles/iot-hub/media/device-registry/custom-policy.png" alt-text="Screenshot of Azure Device Registry custom policy page in the Azure portal." lightbox="../articles/iot-hub/media/device-registry/custom-policy.png":::
115115

116-
1. In the **Certificate management** page, select **+ Create Policy**.
116+
1. In the **Credential policies** page, select **+ Create Policy**.
117117
1. A pane appears where you can configure the policy settings. In the **Basics** tab, complete the fields as follows:
118118

119119
| Property | Value |
@@ -123,7 +123,7 @@ Create custom policies within your ADR namespace to define how certificates are
123123
| **Select a Root CA for certificates in this policy** | Accept the default value, **Use this namespace's Microsoft-issued Root CA (Default)**. |
124124

125125
1. Select **Next**, then **Review + create**.
126-
1. To review the policy, select **Certificate management** to see the policy name and validity period.
126+
1. To review the policy, select **Credential policies** to see the policy name and validity period.
127127

128128
## Create an IoT hub in Azure portal
129129

0 commit comments

Comments
 (0)