Skip to content

Commit 3818ef4

Browse files
Merge pull request #210874 from JimacoMS4/add-certificate-pinning-notice-to-hub-dps
Add certificate pinning notice to IoT Hub and DPS documentation
2 parents 29eebe2 + 48eef80 commit 3818ef4

File tree

2 files changed

+12
-0
lines changed

2 files changed

+12
-0
lines changed

articles/iot-dps/tls-support.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -86,6 +86,10 @@ These cipher suites are currently still supported by DPS but will be depreciated
8686

8787
When DPS enrollments are configured for X.509 authentication, mutual TLS (mTLS) is supported by DPS.
8888

89+
## Certificate pinning
90+
91+
[Certificate pinning](https://www.digicert.com/blog/certificate-pinning-what-is-certificate-pinning) and filtering of the TLS server certificates (aka leaf certificates) and intermediate certificates associated with DPS endpoints is strongly discouraged as Microsoft frequently rolls these certificates with little or no notice. If you must, only pin the root certificates as described in this [Azure IoT blog post](https://techcommunity.microsoft.com/t5/internet-of-things-blog/azure-iot-tls-critical-changes-are-almost-here-and-why-you/ba-p/2393169).
92+
8993
## Use TLS 1.2 in the IoT SDKs
9094

9195
Use the links below to configure TLS 1.2 and allowed ciphers in the Azure IoT client SDKs.

articles/iot-hub/iot-hub-tls-support.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -126,6 +126,14 @@ IoT Edge devices can be configured to use TLS 1.2 when communicating with IoT Hu
126126

127127
After a successful TLS handshake, IoT Hub can authenticate a device using a symmetric key or an X.509 certificate. For certificate-based authentication, this can be any X.509 certificate, including ECC. IoT Hub validates the certificate against the thumbprint or certificate authority (CA) you provide. To learn more, see [Supported X.509 certificates](iot-hub-dev-guide-sas.md#supported-x509-certificates).
128128

129+
## Mutual TLS support
130+
131+
When a device is configured for X.509 authentication in the device registry, mutual TLS (mTLS) is supported by IoT Hub.
132+
133+
## Certificate pinning
134+
135+
[Certificate pinning](https://www.digicert.com/blog/certificate-pinning-what-is-certificate-pinning) and filtering of the TLS server certificates (aka leaf certificates) and intermediate certificates associated with IoT Hub endpoints is strongly discouraged as Microsoft frequently rolls these certificates with little or no notice. If you must, only pin the root certificates as described in this [Azure IoT blog post](https://techcommunity.microsoft.com/t5/internet-of-things-blog/azure-iot-tls-critical-changes-are-almost-here-and-why-you/ba-p/2393169).
136+
129137
## TLS maximum fragment length negotiation (preview)
130138

131139
IoT Hub also supports TLS maximum fragment length negotiation, which is sometimes known as TLS frame size negotiation. This feature is in public preview.

0 commit comments

Comments
 (0)