You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-edge/how-to-connect-downstream-device.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: How to configure downstream devices to connect to Azure IoT Edge ga
4
4
author: PatAltimore
5
5
6
6
ms.author: patricka
7
-
ms.date: 06/10/2024
7
+
ms.date: 08/07/2024
8
8
ms.topic: conceptual
9
9
ms.service: iot-edge
10
10
services: iot-edge
@@ -47,7 +47,7 @@ Acquire the following to prepare your downstream device:
47
47
48
48
* A root CA certificate file.
49
49
50
-
This file was used to generate the device CA certificate in [Configure an IoT Edge device to act as a transparent gateway](how-to-create-transparent-gateway.md), which is available on your downstream device.
50
+
This file was used to generate the Edge CA certificate in [Configure an IoT Edge device to act as a transparent gateway](how-to-create-transparent-gateway.md), which is available on your downstream device.
51
51
52
52
Your downstream device uses this certificate to validate the identity of the gateway device. This trusted certificate validates the transport layer security (TLS) connections to the gateway device. See usage details in the [Provide the root CA certificate](#provide-the-root-ca-certificate) section.
Copy file name to clipboardExpand all lines: articles/iot-edge/how-to-connect-downstream-iot-edge-device.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: How to create a trusted connection between an IoT Edge gateway and
4
4
author: PatAltimore
5
5
6
6
ms.author: patricka
7
-
ms.date: 05/15/2024
7
+
ms.date: 08/07/2024
8
8
ms.topic: conceptual
9
9
ms.service: iot-edge
10
10
services: iot-edge
@@ -90,7 +90,7 @@ Additional device-identity commands, including `add-children`,`list-children`, a
90
90
91
91
## Generate certificates
92
92
93
-
A consistent chain of certificates must be installed across devices in the same gateway hierarchy to establish a secure communication between themselves. Every device in the hierarchy, whether an IoT Edge device or an IoT downstream device, needs a copy of the same root CA certificate. Each IoT Edge device in the hierarchy then uses that root CA certificate as the root for its device CA certificate.
93
+
A consistent chain of certificates must be installed across devices in the same gateway hierarchy to establish a secure communication between themselves. Every device in the hierarchy, whether an IoT Edge device or an IoT downstream device, needs a copy of the same root CA certificate. Each IoT Edge device in the hierarchy then uses that root CA certificate as the root for its Edge CA certificate.
94
94
95
95
With this setup, each downstream IoT Edge device can verify the identity of their parent by verifying that the *edgeHub* they connect to has a server certificate that is signed by the shared root CA certificate.
96
96
@@ -103,11 +103,11 @@ For more information about IoT Edge certificate requirements, see
103
103
104
104
* A **root CA certificate**, which is the topmost shared certificate for all the devices in a given gateway hierarchy. This certificate is installed on all devices.
105
105
* Any **intermediate certificates** that you want to include in the root certificate chain.
106
-
*A**device CA certificate** and its **private key**, generated by the root and intermediate certificates. You need one unique device CA certificate for each IoT Edge device in the gateway hierarchy.
106
+
*An**Edge CA certificate** and its **private key**, generated by the root and intermediate certificates. You need one unique Edge CA certificate for each IoT Edge device in the gateway hierarchy.
107
107
108
108
You can use either a self-signed certificate authority or purchase one from a trusted commercial certificate authority like Baltimore, Verisign, Digicert, or GlobalSign.
109
109
110
-
01. If you don't have your own certificates to use for test, create one set of root and intermediate certificates, then create IoT Edge device CA certificates for each device. In this article, we'll use test certificates generated using [test CA certificates for samples and tutorials](https://github.com/Azure/iotedge/tree/main/tools/CACertificates).
110
+
01. If you don't have your own certificates to use for test, create one set of root and intermediate certificates, then create Edge CA certificates for each device. In this article, we'll use test certificates generated using [test CA certificates for samples and tutorials](https://github.com/Azure/iotedge/tree/main/tools/CACertificates).
111
111
For example, the following commands create a root CA certificate, a parent device certificate, and a child device certificate.
112
112
113
113
```bash
@@ -138,11 +138,11 @@ For more information on installing certificates on a device, see [Manage certifi
138
138
139
139
To configure your parent device, open a local or remote command shell.
140
140
141
-
To enable secure connections, every IoT Edge parent device in a gateway scenario needs to be configured with a unique device CA certificate and a copy of the root CA certificate shared by all devices in the gateway hierarchy.
141
+
To enable secure connections, every IoT Edge parent device in a gateway scenario needs to be configured with a unique Edge CA certificate and a copy of the root CA certificate shared by all devices in the gateway hierarchy.
142
142
143
143
01. Check your certificates meet the [format requirements](how-to-manage-device-certificates.md#format-requirements).
144
144
145
-
01. Transfer the **root CA certificate**, **parent device CA certificate**, and **parent private key** to the parent device.
145
+
01. Transfer the **root CA certificate**, **parent Edge CA certificate**, and **parent private key** to the parent device.
146
146
147
147
01. Copy the certificates and keys to the correct directories. The preferred directories for device certificates are `/var/aziot/certs` for the certificates and `/var/aziot/secrets` for keys.
148
148
@@ -393,11 +393,11 @@ To verify the *hostname*, you need to inspect the environment variables of the *
393
393
394
394
To configure your downstream device, open a local or remote command shell.
395
395
396
-
To enable secure connections, every IoT Edge downstream device in a gateway scenario needs to be configured with a unique device CA certificate and a copy of the root CA certificate shared by all devices in the gateway hierarchy.
396
+
To enable secure connections, every IoT Edge downstream device in a gateway scenario needs to be configured with a unique Edge CA certificate and a copy of the root CA certificate shared by all devices in the gateway hierarchy.
397
397
398
398
01. Check your certificates meet the [format requirements](how-to-manage-device-certificates.md#format-requirements).
399
399
400
-
01. Transfer the **root CA certificate**, **child device CA certificate**, and **child private key** to the downstream device.
400
+
01. Transfer the **root CA certificate**, **child Edge CA certificate**, and **child private key** to the downstream device.
401
401
402
402
01. Copy the certificates and keys to the correct directories. The preferred directories for device certificates are `/var/aziot/certs` for the certificates and `/var/aziot/secrets` for keys.
Copy file name to clipboardExpand all lines: articles/iot-edge/how-to-create-test-certificates.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -223,11 +223,11 @@ Device identity certificates go in the **Provisioning** section of the config fi
223
223
224
224
---
225
225
226
-
## Create edge CA certificates
226
+
## Create Edge CA certificates
227
227
228
-
These certificates are required for **gateway scenarios** because the edge CA certificate is how the IoT Edge device verifies its identity to downstream devices. You can skip this section if you're not connecting any downstream devices to IoT Edge.
228
+
These certificates are required for **gateway scenarios** because the Edge CA certificate is how the IoT Edge device verifies its identity to downstream devices. You can skip this section if you're not connecting any downstream devices to IoT Edge.
229
229
230
-
The **edge CA** certificate is also responsible for creating certificates for modules running on the device, but IoT Edge runtime can create temporary certificates if edge CA isn't configured. Edge CA certificates go in the **Edge CA** section of the `config.toml` file on the IoT Edge device. To learn more, see [Understand how Azure IoT Edge uses certificates](iot-edge-certs.md).
230
+
The **Edge CA** certificate is also responsible for creating certificates for modules running on the device, but IoT Edge runtime can create temporary certificates if Edge CA isn't configured. Edge CA certificates go in the **Edge CA** section of the `config.toml` file on the IoT Edge device. To learn more, see [Understand how Azure IoT Edge uses certificates](iot-edge-certs.md).
Copy file name to clipboardExpand all lines: articles/iot-edge/how-to-create-transparent-gateway.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Use an Azure IoT Edge device as a transparent gateway that can proc
4
4
author: PatAltimore
5
5
6
6
ms.author: patricka
7
-
ms.date: 06/03/2024
7
+
ms.date: 08/07/2024
8
8
ms.topic: conceptual
9
9
ms.service: iot-edge
10
10
services: iot-edge
@@ -56,21 +56,21 @@ If you don't have a device ready, you should create one before continuing with t
56
56
57
57
---
58
58
59
-
## Set up the device CA certificate
59
+
## Set up the Edge CA certificate
60
60
61
-
All IoT Edge gateways need a device CA certificate installed on them. The IoT Edge security daemon uses the IoT Edge device CA certificate to sign a workload CA certificate, which in turn signs a server certificate for IoT Edge hub. The gateway presents its server certificate to the downstream device during the initiation of the connection. The downstream device checks to make sure that the server certificate is part of a certificate chain that rolls up to the root CA certificate. This process allows the downstream device to confirm that the gateway comes from a trusted source. For more information, see [Understand how Azure IoT Edge uses certificates](iot-edge-certs.md).
61
+
All IoT Edge gateways need an Edge CA certificate installed on them. The IoT Edge security daemon uses the Edge CA certificate to sign a workload CA certificate, which in turn signs a server certificate for IoT Edge hub. The gateway presents its server certificate to the downstream device during the initiation of the connection. The downstream device checks to make sure that the server certificate is part of a certificate chain that rolls up to the root CA certificate. This process allows the downstream device to confirm that the gateway comes from a trusted source. For more information, see [Understand how Azure IoT Edge uses certificates](iot-edge-certs.md).
62
62
63
63
:::image type="content" source="./media/how-to-create-transparent-gateway/gateway-setup.png" alt-text="Screenshot that shows the gateway certificate setup." lightbox="./media/how-to-create-transparent-gateway/gateway-setup.png":::
64
64
65
-
The root CA certificate and the device CA certificate (with its private key) need to be present on the IoT Edge gateway device and configured in the IoT Edge config file. Remember that in this case *root CA certificate* means the topmost certificate authority for this IoT Edge scenario. The gateway device CA certificate and the downstream device certificates need to roll up to the same root CA certificate.
65
+
The root CA certificate and the Edge CA certificate (with its private key) need to be present on the IoT Edge gateway device and configured in the IoT Edge config file. Remember that in this case *root CA certificate* means the topmost certificate authority for this IoT Edge scenario. The gateway Edge CA certificate and the downstream device certificates need to roll up to the same root CA certificate.
66
66
67
67
>[!TIP]
68
-
>The process of installing the root CA certificate and device CA certificate on an IoT Edge device is also explained in more detail in [Manage certificates on an IoT Edge device](how-to-manage-device-certificates.md).
68
+
>The process of installing the root CA certificate and Edge CA certificate on an IoT Edge device is also explained in more detail in [Manage certificates on an IoT Edge device](how-to-manage-device-certificates.md).
69
69
70
70
Have the following files ready:
71
71
72
72
* Root CA certificate
73
-
*Device CA certificate
73
+
*Edge CA certificate
74
74
* Device CA private key
75
75
76
76
For production scenarios, you should generate these files with your own certificate authority. For development and test scenarios, you can use demo certificates.
@@ -81,7 +81,7 @@ If you don't have your own certificate authority and want to use demo certificat
81
81
82
82
1. To start, set up the scripts for generating certificates on your device.
83
83
1. Create a root CA certificate. At the end of those instructions, you'll have a root CA certificate file `<path>/certs/azure-iot-test-only.root.ca.cert.pem`.
84
-
1. Create IoT Edge device CA certificates. At the end of those instructions, you'll have a device CA certificate `<path>/certs/iot-edge-device-ca-<cert name>-full-chain.cert.pem` its private key `<path>/private/iot-edge-device-ca-<cert name>.key.pem`.
84
+
1. Create Edge CA certificates. At the end of those instructions, you'll have an Edge CA certificate `<path>/certs/iot-edge-device-ca-<cert name>-full-chain.cert.pem` its private key `<path>/private/iot-edge-device-ca-<cert name>.key.pem`.
85
85
86
86
### Copy certificates to device
87
87
@@ -127,7 +127,7 @@ For more information on the following commands, see [PowerShell functions for Io
127
127
1. Copy the certificates to the EFLOW virtual machine to a directory where you have write access. For example, the `/home/iotedge-user` home directory.
@@ -198,7 +198,7 @@ For more information on the following commands, see [PowerShell functions for Io
198
198
1. Find the `trust_bundle_cert` parameter. Uncomment this line and provide the file URI to the root CA certificate file on your device.
199
199
200
200
1. Find the `[edge_ca]` section of the file. Uncomment the three lines in this section and provide the file URIs to your certificate and key files as values for the following properties:
Copy file name to clipboardExpand all lines: articles/iot-edge/iot-edge-certs.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,10 +2,10 @@
2
2
title: Understand how IoT Edge uses certificates for security
3
3
titleSuffix: Azure IoT Edge
4
4
description: How Azure IoT Edge uses certificate to validate devices, modules, and downstream devices enabling secure connections between them.
5
-
author: jlian
5
+
author: PatAltimore
6
6
7
-
ms.author: jlian
8
-
ms.date: 07/05/2023
7
+
ms.author: patricka
8
+
ms.date: 08/07/2024
9
9
ms.topic: conceptual
10
10
ms.service: iot-edge
11
11
services: iot-edge
@@ -386,7 +386,7 @@ In a typical manufacturing process for creating secure devices, root CA certific
386
386
* Multiple companies involved serially in the production of a device
387
387
* A customer buying a root CA and deriving a signing certificate for the manufacturer to sign the devices they make on that customer's behalf
388
388
389
-
In any case, the manufacturer uses an intermediate CA certificate at the end of this chain to sign the edge CA certificate placed on the end device. These intermediate certificates are closely guarded at the manufacturing plant. They undergo strict processes, both physical and electronic for their usage.
389
+
In any case, the manufacturer uses an intermediate CA certificate at the end of this chain to sign the Edge CA certificate placed on the end device. These intermediate certificates are closely guarded at the manufacturing plant. They undergo strict processes, both physical and electronic for their usage.
Copy file name to clipboardExpand all lines: articles/iot-edge/production-checklist.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Ready your Azure IoT Edge solution for production. Learn how to set
4
4
author: PatAltimore
5
5
6
6
ms.author: patricka
7
-
ms.date: 06/13/2024
7
+
ms.date: 08/07/2024
8
8
ms.topic: concept-article
9
9
ms.service: iot-edge
10
10
services: iot-edge
@@ -33,9 +33,9 @@ IoT Edge devices can be anything from a Raspberry Pi to a laptop to a virtual ma
33
33
34
34
### Install production certificates
35
35
36
-
Every IoT Edge device in production needs a device certificate authority (CA) certificate installed on it. That CA certificate is then declared to the IoT Edge runtime in the config file. For development and testing scenarios, the IoT Edge runtime creates temporary certificates if no certificates are declared in the config file. However, these temporary certificates expire after three months and aren't secure for production scenarios. For production scenarios, you should provide your own device CA certificate, either from a self-signed certificate authority or purchased from a commercial certificate authority.
36
+
Every IoT Edge device in production needs a device certificate authority (CA) certificate installed on it. That CA certificate is then declared to the IoT Edge runtime in the config file. For development and testing scenarios, the IoT Edge runtime creates temporary certificates if no certificates are declared in the config file. However, these temporary certificates expire after three months and aren't secure for production scenarios. For production scenarios, you should provide your own Edge CA certificate, either from a self-signed certificate authority or purchased from a commercial certificate authority.
37
37
38
-
To understand the role of the device CA certificate, see [How Azure IoT Edge uses certificates](iot-edge-certs.md).
38
+
To understand the role of the Edge CA certificate, see [How Azure IoT Edge uses certificates](iot-edge-certs.md).
39
39
40
40
For more information about how to install certificates on an IoT Edge device and reference them from the config file, see [Manage certificate on an IoT Edge device](how-to-manage-device-certificates.md).
0 commit comments