You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-hub/how-to-configure-credential.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: azure-iot-hub
8
8
services: iot-hub
9
9
ms.topic: how-to
10
10
ai-usage: ai-generated
11
-
ms.date: 03/11/2026
11
+
ms.date: 04/14/2026
12
12
#Customer intent: As a developer setting up certificate management, I want to configure a root CA credential in my ADR namespace.
13
13
---
14
14
@@ -61,15 +61,15 @@ Follow these steps to configure your root CA credential.
61
61
62
62
1. In the resource menu, select **Namespaces**, and then select your ADR namespace from the list.
63
63
64
-
1. In the resource menu of your ADR namespace, select **Certificate management (Preview)** under **Namespace resources**.
64
+
1. In the resource menu of your ADR namespace, select **Credential policies (Preview)** under **Namespace resources**.
65
65
66
-
1. On the **Certificate management (Preview)** page, select **Enable** from the **Enable certificate management** dialog.
66
+
1. On the **Credential policies (Preview)** page, select **Enable** from the **Enable certificate management** dialog.
67
67
68
68
:::image type="content" source="./media/how-to-configure-credential/enable-certificate-management.png" alt-text="Screenshot of the Certificate management page for an Azure Device Registry namespace in the Azure portal, highlighting the Enable button in the Enable certificate management dialog." lightbox="./media/how-to-configure-credential/enable-certificate-management.png":::
69
69
70
70
1. Azure provisions a root CA credential for your namespace. This process takes a few moments to complete.
71
71
72
-
1. After provisioning is complete, your root CA credential is ready to use. The credential is displayed on the **Certificate management (Preview)** page.
72
+
1. After provisioning is complete, your root CA credential is ready to use. The credential is displayed on the **Credential policies (Preview)** page.
Copy file name to clipboardExpand all lines: articles/iot-hub/how-to-create-policy-external-certificate.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.author: cwatson
7
7
ms.service: azure-iot-hub
8
8
services: iot-hub
9
9
ms.topic: how-to
10
-
ms.date: 04/16/2026
10
+
ms.date: 04/14/2026
11
11
ai-usage: ai-generated
12
12
#Customer intent: As an IoT administrator, I want to create or edit an external CA policy in Azure Device Registry so I can issue and manage device certificates by using my external CA lifecycle.
13
13
---
@@ -70,11 +70,11 @@ Create a policy that uses your external CA, and then activate it after you uploa
70
70
71
71
1. Open your **Azure Device Registry** namespace.
72
72
73
-
1. In the sidebar menu, under **Namespace resources**, select **Certificate management**.
73
+
1. In the sidebar menu, under **Namespace resources**, select **Credential policies**.
74
74
75
75
1. Select **Create Policy**.
76
76
77
-
:::image type="content" source="media/how-to-create-policy-external-certificate/certificate-management.png" alt-text="Screenshot showing the certificate management pane.":::
77
+
:::image type="content" source="media/how-to-create-policy-external-certificate/certificate-management.png" alt-text="Screenshot showing the Credential policies pane.":::
78
78
79
79
1. In the **Basics** tab, complete the fields as follows:
80
80
@@ -107,7 +107,7 @@ Create a policy that uses your external CA, and then activate it after you uploa
107
107
108
108
Update the validity period for an existing external CA policy when certificate lifetime requirements change.
109
109
110
-
1. In the sidebar menu of your Device Registry namespace, under **Namespace resources**, select **Certificate management**.
110
+
1. In the sidebar menu of your Device Registry namespace, under **Namespace resources**, select **Credential policies**.
111
111
112
112
1. Select the policy that you want to edit.
113
113
@@ -121,7 +121,7 @@ Update the validity period for an existing external CA policy when certificate l
121
121
122
122
Synchronize your new or updated policy.
123
123
124
-
1. In the sidebar menu of your Device Registry namespace, under **Namespace resources**, select **Certificate management**.
124
+
1. In the sidebar menu of your Device Registry namespace, under **Namespace resources**, select **Credential policies**.
Copy file name to clipboardExpand all lines: articles/iot-hub/how-to-create-policy.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: azure-iot-hub
8
8
services: iot-hub
9
9
ms.topic: how-to
10
10
ai-usage: ai-generated
11
-
ms.date: 04/10/2026
11
+
ms.date: 04/14/2026
12
12
#Customer intent: As an IoT administrator, I want to create or edit a policy in Azure Device Registry so I can issue Microsoft-backed X.509 device certificates with the validity period my deployment requires.
13
13
---
14
14
@@ -51,11 +51,11 @@ You can create a policy by using the Azure portal or the Azure CLI. In this prev
51
51
52
52
1. Open your **Azure Device Registry** namespace.
53
53
54
-
1. In the sidebar menu, under **Namespace resources**, select **Certificate management**.
54
+
1. In the sidebar menu, under **Namespace resources**, select **Credential policies**.
55
55
56
56
1. Select **Create Policy**.
57
57
58
-
:::image type="content" source="media/how-to-create-policy/certificate-management.png" alt-text="Screenshot showing the certificate management pane.":::
58
+
:::image type="content" source="media/how-to-create-policy/certificate-management.png" alt-text="Screenshot showing the Credential policies pane.":::
59
59
60
60
1. In the **Basics** tab, complete the fields as follows:
61
61
@@ -75,7 +75,7 @@ You can create a policy by using the Azure portal or the Azure CLI. In this prev
75
75
76
76
Edit an existing policy to update its validity period when security or operational requirements change.
77
77
78
-
1. In the sidebar menu of your ADR namespace, under **Namespace resources**, select **Certificate management**.
78
+
1. In the sidebar menu of your ADR namespace, under **Namespace resources**, select **Credential policies**.
79
79
80
80
1. Select the policy that you want to edit.
81
81
@@ -91,7 +91,7 @@ Edit an existing policy to update its validity period when security or operation
91
91
92
92
Synchronize your new or updated policy.
93
93
94
-
1. In the sidebar menu of your ADR namespace, under **Namespace resources**, select **Certificate management**.
94
+
1. In the sidebar menu of your ADR namespace, under **Namespace resources**, select **Credential policies**.
Copy file name to clipboardExpand all lines: includes/iot-hub-device-registry-portal.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -107,13 +107,13 @@ Repeat these steps to assign the **Azure Device Registry Contributor** role:
107
107
108
108
Create custom policies within your ADR namespace to define how certificates are issued and managed for your devices. Policies allow you to set parameters such as certificate validity periods and subjects. Editing or disabling a policy isn't supported in preview.
109
109
110
-
1. In the ADR namespace you created, under **Namespace resources**, select **Certificate management (Preview)**.
110
+
1. In the ADR namespace you created, under **Namespace resources**, select **Credential policies (Preview)**.
111
111
112
112
In the **Enable certificate management** dialog, select **Enable**.
113
113
114
114
:::image type="content" source="../articles/iot-hub/media/device-registry/custom-policy.png" alt-text="Screenshot of Azure Device Registry custom policy page in the Azure portal." lightbox="../articles/iot-hub/media/device-registry/custom-policy.png":::
115
115
116
-
1. In the **Certificate management** page, select **+ Create Policy**.
116
+
1. In the **Credential policies** page, select **+ Create Policy**.
117
117
1. A pane appears where you can configure the policy settings. In the **Basics** tab, complete the fields as follows:
118
118
119
119
| Property | Value |
@@ -123,7 +123,7 @@ Create custom policies within your ADR namespace to define how certificates are
123
123
|**Select a Root CA for certificates in this policy**| Accept the default value, **Use this namespace's Microsoft-issued Root CA (Default)**. |
124
124
125
125
1. Select **Next**, then **Review + create**.
126
-
1. To review the policy, select **Certificate management** to see the policy name and validity period.
126
+
1. To review the policy, select **Credential policies** to see the policy name and validity period.
0 commit comments