You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
01. Find or add the **Edge CA certificate** section in the config file. Update the certificate `cert` and private key `pk` parameters with the file URI paths for the certificate and key files on the parent IoT Edge device. IoT Edge requires the certificate and private key to be in text-based privacy-enhanced mail (PEM) format. For example:
222
+
01. Find or add the **Edge CA certificate** section in the config file. Update the certificate `cert` and private key `pk` parameters with the file URI paths for the full-chain certificate and key files on the parent IoT Edge device. IoT Edge requires the certificate and private key to be in text-based privacy-enhanced mail (PEM) format. For example:
01. Find or add the **Edge CA certificate** section in the configuration file. Update the certificate `cert` and private key `pk` parameters with the file URI paths for the certificate and key files on the IoT Edge downstream device. IoT Edge requires the certificate and private key to be in text-based privacy-enhanced mail (PEM) format. For example:
389
+
01. Find or add the **Edge CA certificate** section in the configuration file. Update the certificate `cert` and private key `pk` parameters with the file URI paths for the full-chain certificate and key files on the IoT Edge downstream device. IoT Edge requires the certificate and private key to be in text-based privacy-enhanced mail (PEM) format. For example:
@@ -448,46 +448,46 @@ You should already have IoT Edge installed on your device. If not, follow the st
448
448
01. Verify the TLS/SSL connection from the child to the parent by running the following `openssl` command on the downstream device. Replace `<parent hostname>` with the FQDN or IP address of the parent.
The `Subject: CN = ` value should match the **hostname** parameter specified in the parent's `config.toml` configuration file.
489
-
490
-
If the commandtimes out, there may be blocked ports between the child and parent devices. Review the network configuration and settings for the devices.
The "Can't use SSL_get_servername" message can be ignored.
472
+
473
+
The `depth=0 CN = ` value should match the **hostname** parameter specified in the parent's `config.toml` configuration file.
474
+
475
+
If the command times out, there may be blocked ports between the child and parent devices. Review the network configuration and settings for the devices.
476
+
477
+
> [!WARNING]
478
+
> A previous version of this document directed users to copy the `iot-edge-device-ca-gateway.cert.pem` certificate for use in the gateway `[edge_ca]` section. This was incorrect, and results in certificate validation errors from the downstream device. For example, the `openssl s_client ...` command above will produce:
479
+
>
480
+
> ```
481
+
> Can't use SSL_get_servername
482
+
> depth=1 CN = gateway.ca
483
+
> verify error:num=20:unable to get local issuer certificate
484
+
> verify return:1
485
+
> depth=0 CN = <parent hostname>
486
+
> verify return:1
487
+
> DONE
488
+
>```
489
+
>
490
+
> The same issue will appear for TLS-enabled devices connecting to the downstream Edge device if`iot-edge-device-ca-downstream.cert.pem` is copied to the device instead of `iot-edge-device-ca-downstream-full-chain.cert.pem`.
0 commit comments