This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Note
Access to this page requires authorization. You can trysigning in orchanging directories.
Access to this page requires authorization. You can trychanging directories.
Use CA certificate chain in Azure Event Grid to authenticate clients while connecting to the service.
In this guide, you perform the following tasks:
If you don't already have a certificate, you can create a sample certificate using thestep CLI. Consider installing manually for Windows.
.\step ca init --deployment-type standalone --name MqttAppSamplesCA --dns localhost --address 127.0.0.1:443 --provisioner MqttAppSamplesCAProvisioner.\step certificate create client1-authnID client1-authnID.pem client1-authnID.key --ca .step/certs/intermediate_ca.crt --ca-key .step/secrets/intermediate_ca_key --no-password --insecure --not-after 2400hstep certificate fingerprint client1-authn-ID.pemNote

{ "properties": { "description": "CA certificate description", "encodedCertificate": "-----BEGIN CERTIFICATE-----`Base64 encoded Certificate`-----END CERTIFICATE-----" }}Use the following commands to upload/show/delete a certificate authority (CA) certificate to the service
Upload certificate authority root or intermediate certificate
az eventgrid namespace ca-certificate create -g myRG --namespace-name myNS -n myCertName --certificate @./resources/ca-cert.jsonShow certificate information
az eventgrid namespace ca-certificate show -g myRG --namespace-name myNS -n myCertNameDelete certificate
az eventgrid namespace ca-certificate delete -g myRG --namespace-name myNS -n myCertNameWas this page helpful?
Need help with this topic?
Want to try using Ask Learn to clarify or guide you through this topic?
Was this page helpful?
Want to try using Ask Learn to clarify or guide you through this topic?