You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-dps/about-iot-dps.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,11 +28,11 @@ Before the device provisioning flow begins, there are two manual steps to prepar
28
28
29
29
Once the device and cloud are set up for provisioning, the following steps kick off automatically as soon as the device powers on for the first time:
30
30
31
-
1.When the device first powers on, it connects to the DPS endpoint and presents it authentication credentials.
31
+
1.The device powers on for the first time, then connects to the DPS endpoint and presents it authentication credentials.
32
32
1. The DPS instance checks the identity of the device against its enrollment list. Once the device identity is verified, DPS assigns the device to an IoT hub and registers it in the hub.
33
33
1. The DPS instance receives the device ID and registration information from the assigned hub and passes that information back to the device.
34
34
1. The device uses its registration information to connect directly to its assigned IoT hub and authenticate.
35
-
1.Once authenticated, the device and IoT hub begin communicating directly. The DPS instance has no further role as an intermediary unless the device needs to reprovision.
35
+
1.The device and IoT hub begin communicating directly. The DPS instance has no further role as an intermediary unless the device needs to reprovision.
36
36
37
37
## When to use Device Provisioning Service
38
38
@@ -46,11 +46,11 @@ There are many provisioning scenarios in which DPS is an excellent choice for ge
46
46
* Reprovisioning based on a change in the device
47
47
* Rolling the keys used by the device to connect to IoT Hub (when not using X.509 certificates to connect)
48
48
49
-
Provisioning of nested IoT Edge devices (parent/child hierarchies) is not currently supported by DPS.
49
+
Provisioning of nested IoT Edge devices (parent/child hierarchies) isn't currently supported by DPS.
50
50
51
51
## Prepare for provisioning
52
52
53
-
There are two distinct steps in the deployment process of a device that will provision with DPS:
53
+
There are two steps that take place ahead of a device provisioning with DPS:
54
54
55
55
* The **manufacturing step** in which the device is created and prepared at the factory, and
56
56
* The **cloud setup step** in which the Device Provisioning Service is configured for automated provisioning.
@@ -61,17 +61,17 @@ Both of these steps can be incorporated into existing manufacturing and deployme
61
61
62
62
This step is all about what happens on the manufacturing line. The roles involved in this step include silicon designer, silicon manufacturer, integrator and/or the end manufacturer of the device. This step is concerned with creating the hardware itself.
63
63
64
-
DPS doesn't introduce a new step in the manufacturing process; rather, it ties into the existing step that installs the initial software and (ideally) the HSM on the device. Instead of creating a device ID in this step, the device is programmed with the provisioning service information, enabling it to call the provisioning service to get its connection info/IoT solution assignment when it's switched on.
64
+
DPS doesn't introduce a new step in the manufacturing process; rather, it ties into the existing step that installs the initial software and (ideally) the hardware security module (HSM) on the device. Instead of creating a device ID in this step, the device is programmed with the provisioning service information, enabling it to call the provisioning service to get its connection info/IoT solution assignment when it's switched on.
65
65
66
-
Also in this step, the manufacturer supplies the device deployer/operator with identifying key information. Supplying that information could be as simple as confirming that all devices have an X.509 certificate generated from a signing certificate provided by the device deployer/operator, or as complicated as extracting the public portion of a TPM endorsement key from each TPM device. These services are offered by many silicon manufacturers today.
66
+
Also in this step, the manufacturer supplies the device deployer/operator with identifying key information. Supplying that information could be as simple as confirming that all devices have an X.509 certificate generated from a signing certificate provided by the device deployer/operator, or as complicated as extracting the public portion of a TPM endorsement key from each TPM device. Many silicon manufacturers offer these services.
67
67
68
68
### Cloud setup step
69
69
70
70
This step is about configuring the cloud for proper automatic provisioning. Generally there are two types of users involved in the cloud setup step: someone who knows how devices need to be initially set up (a device operator), and someone else who knows how devices are to be split among the IoT hubs (a solution operator).
71
71
72
-
There's a one-time initial setup of the provisioning service, which is usually handled by the solution operator. Once the provisioning service is configured, it doesn't have to be modified unless the use case changes.
72
+
There's a one-time initial setup of the provisioning service, which the solution operator usually handles. Once the provisioning service is configured, it doesn't have to be modified unless the use case changes.
73
73
74
-
After the service has been configured for automatic provisioning, it must be prepared to enroll devices. This step is done by the device operator, who knows the desired configuration of the devices and is in charge of making sure the provisioning service can properly attest to a device's identity when it looks for its IoT hub. The device operator takes the identifying key information from the manufacturer and adds it to the enrollment list. There can be subsequent updates to the enrollment list as new entries are added or existing entries are updated with the latest information about the devices.
74
+
After the service is configured for automatic provisioning, it must be prepared to enroll devices. This step is done by the device operator, who knows the desired configuration of the devices and makes sure that the provisioning service can properly attest to a device's identity. The device operator takes the identifying key information from the manufacturer and adds it to the enrollment list. There can be subsequent updates to the enrollment list as new entries are added or existing entries are updated with the latest information about the devices.
75
75
76
76
## Registration and provisioning
77
77
@@ -118,13 +118,13 @@ For resiliency and reliability, we recommend deploying to one of the regions tha
118
118
119
119
Device Provisioning Service stores customer data. By default, customer data is replicated to a secondary region to support disaster recovery scenarios. For deployments in Southeast Asia and Brazil South, customers can choose to keep their data only within that region by [disabling disaster recovery](./iot-dps-ha-dr.md). For more information, see [Cross-region replication in Azure](../availability-zones/cross-region-replication-azure.md).
120
120
121
-
DPS uses the same [device provisioning endpoint](concepts-service.md#device-provisioning-endpoint) for all provisioning service instances, and performs traffic load balancing to the nearest available service endpoint. As a result, authentication secrets may be temporarily transferred outside of the region where the DPS instance was initially created. However, once the device is connected, the device data flows directly to the original region of the DPS instance. To ensure that your data doesn't leave the original or secondary region, use a private endpoint. To learn how to set up private endpoints, see [DPS support for virtual networks](virtual-network-support.md#private-endpoint-limitations).
121
+
DPS uses the same [device provisioning endpoint](concepts-service.md#device-provisioning-endpoint) for all provisioning service instances, and performs traffic load balancing to the nearest available service endpoint. As a result, authentication secrets may be temporarily transferred outside of the region where the DPS instance was initially created. However, once the device is connected, the device data flows directly to the original region of the DPS instance. To ensure that your data doesn't leave the original or secondary region, use a private endpoint. To learn how to set up private endpoints, see [DPS support for virtual networks](virtual-network-support.md#private-endpoint-limitations).
122
122
123
123
## Quotas and Limits
124
124
125
-
Each Azure subscription has default quota limits in place that could impact the scope of your IoT solution. The current limit on a per-subscription basis is 10 Device Provisioning Services per subscription.
125
+
Each Azure subscription has default quota limits in place that could impact the scope of your IoT solution. The current limit is 10 Device Provisioning Service instances per subscription.
126
126
127
-
For more details on quota limits, see [Azure Subscription Service Limits](../azure-resource-manager/management/azure-subscription-service-limits.md).
127
+
For more information about quota limits, see [Azure Subscription Service Limits](../azure-resource-manager/management/azure-subscription-service-limits.md).
Copy file name to clipboardExpand all lines: articles/iot-dps/concepts-symmetric-key-attestation.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ You can also provide your own symmetric keys for enrollments by disabling this o
28
28
29
29
Symmetric key attestation with the Device Provisioning Service is performed using the same [security tokens](../iot-hub/iot-hub-dev-guide-sas.md#sas-token-structure) supported by IoT hubs to identify devices. These security tokens are Shared Access Signature (SAS) tokens.
30
30
31
-
SAS tokens have a hashed *signature* that is created using the symmetric key. The Device Provisioning Service receates the signature to verify whether or not a security token presented during attestation is authentic.
31
+
SAS tokens have a hashed *signature* that is created using the symmetric key. The Device Provisioning Service recreates the signature to verify whether or not a security token presented during attestation is authentic.
Copy file name to clipboardExpand all lines: articles/iot-dps/quick-create-simulated-device-x509.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -248,7 +248,7 @@ Perform the steps in this section in your Git Bash prompt.
248
248
249
249
The certificate file has its subject common name (CN) set to `my-x509-device`. For X.509-based enrollments, the [Registration ID](./concepts-service.md#registration-id) is set to the common name. The registration ID is a case-insensitive string of alphanumeric characters plus the special characters: `'-'`, `'.'`, `'_'`, `':'`. The last character must be alphanumeric or dash (`'-'`). The common name must adhere to this format. DPS supports registration IDs up to 128 characters long; however, the maximum length of the subject common name in an X.509 certificate is 64 characters. The registration ID, therefore, is limited to 64 characters when using X.509 certificates.
250
250
251
-
5. The certificate file is Base64 encoded. To view the subject common name (CN) and other properties of the certificate file, enter the following command:
251
+
5. The certificate file is Base 64 encoded. To view the subject common name (CN) and other properties of the certificate file, enter the following command:
0 commit comments