You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-dps/how-to-manage-linked-iot-hubs.md
+7-5Lines changed: 7 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: How to manage linked IoT hubs with Device Provisioning Service (DPS)
3
3
description: This article shows how to link and manage IoT hubs with the Device Provisioning Service (DPS).
4
4
author: kgremban
5
5
ms.author: kgremban
6
-
ms.date: 10/24/2022
6
+
ms.date: 01/18/2023
7
7
ms.topic: how-to
8
8
ms.service: iot-dps
9
9
services: iot-dps
@@ -38,6 +38,12 @@ When you link an IoT hub to your DPS instance, it becomes available to participa
38
38
39
39
* For enrollments that do explicitly set the IoT hubs to apply allocation policy to, you'll need to manually or programmatically add the new IoT hub to the enrollment settings for it to participate in allocation.
40
40
41
+
### Limitations
42
+
43
+
* There are some limitations when working with linked IoT hubs and private endpoints. For more information, see [Private endpoint limitations](virtual-network-support.md#private-endpoint-limitations).
44
+
45
+
* The linked IoT Hub must have [Connect using shared access policies](../iot-hub/iot-hub-dev-guide-azure-ad-rbac.md#azure-ad-access-and-shared-access-policies) set to **Allow**.
46
+
41
47
### Use the Azure portal to link an IoT hub
42
48
43
49
In the Azure portal, you can link an IoT hub either from the left menu of your DPS instance or from the enrollment when creating or updating an enrollment. In both cases, the IoT hub is scoped to the DPS instance (not just the enrollment).
@@ -215,10 +221,6 @@ To update symmetric keys for a linked IoT hub with Azure CLS:
215
221
az iot dps update --name MyExampleDps --set properties.iotHubs[0].connectionString="HostName=MyExampleHub-2.azure-devices.net;SharedAccessKeyName=iothubowner;SharedAccessKey=NewTokenValue"
216
222
```
217
223
218
-
## Limitations
219
-
220
-
There are some limitations when working with linked IoT hubs and private endpoints. For more information, see [Private endpoint limitations](virtual-network-support.md#private-endpoint-limitations).
221
-
222
224
## Next steps
223
225
224
226
* To learn more about allocation policies, see [Manage allocation policies](how-to-use-allocation-policies.md).
@@ -94,14 +94,16 @@ The following table describes the permissions available for IoT Hub service API
94
94
95
95
## Azure AD access and shared access policies
96
96
97
-
By default, IoT Hub supports service API access through both Azure AD and [shared access policies and security tokens](iot-hub-dev-guide-sas.md). To minimize potential security vulnerabilities inherent in security tokens, disable access with shared access policies:
97
+
By default, IoT Hub supports service API access through both Azure AD and [shared access policies and security tokens](iot-hub-dev-guide-sas.md). To minimize potential security vulnerabilities inherent in security tokens, disable access with shared access policies.
98
98
99
99
1. Ensure that your service clients and users have [sufficient access](#manage-access-to-iot-hub-by-using-azure-rbac-role-assignment) to your IoT hub. Follow the [principle of least privilege](../security/fundamentals/identity-management-best-practices.md).
100
100
1. In the [Azure portal](https://portal.azure.com), go to your IoT hub.
101
101
1. On the left pane, select **Shared access policies**.
102
-
1. Under **Connect using shared access policies**, select **Deny**.
102
+
1. Under **Connect using shared access policies**, select **Deny**, and review the warning.
103
103
:::image type="content" source="media/iot-hub-dev-guide-azure-ad-rbac/disable-local-auth.png" alt-text="Screenshot that shows how to turn off IoT Hub shared access policies." border="true":::
104
-
1. Review the warning, and then select **Save**.
104
+
105
+
> [!WARNING]
106
+
> By denying connections using shared access policies, all users and services that connect using this method lose access immediately. Notably, since Device Provisioning Service (DPS) only supports linking IoT hubs using shared access policies, all device provisioning flows will fail with "unauthorized" error. Proceed carefully and plan to replace access with Azure AD role based access. **Do not proceed if you use DPS**.
105
107
106
108
Your IoT Hub service APIs can now be accessed only through Azure AD and RBAC.
0 commit comments