You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-edge/how-to-provision-single-device-linux-x509.md
+15-15Lines changed: 15 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.service: azure-iot-edge
7
7
ms.custom: linux-related-content
8
8
services: iot-edge
9
9
ms.topic: how-to
10
-
ms.date: 06/13/2024
10
+
ms.date: 05/15/2025
11
11
ms.author: patricka
12
12
---
13
13
@@ -32,11 +32,11 @@ The steps in this article walk through a process called manual provisioning, whe
32
32
This article covers using X.509 certificates as your authentication method. If you want to use symmetric keys, see [Create and provision an IoT Edge device on Linux using symmetric keys](how-to-provision-single-device-linux-symmetric.md).
33
33
34
34
> [!NOTE]
35
-
> If you have many devices to set up and don't want to manually provision each one, use one of the following articles to learn how IoT Edge works with the IoT Hub device provisioning service:
35
+
> If you have many devices to set up and don't want to manually provision each one, use one of the following articles to learn how IoT Edge works with the IoT Hub Device Provisioning Service:
36
36
>
37
-
> *[Create and provision IoT Edge devices at scale using X.509 certificates](how-to-provision-devices-at-scale-linux-x509.md)
38
-
> *[Create and provision IoT Edge devices at scale with a TPM](how-to-provision-devices-at-scale-linux-tpm.md)
39
-
> *[Create and provision IoT Edge devices at scale using symmetric keys](how-to-provision-devices-at-scale-linux-symmetric.md)
37
+
> *[Create and provision IoT Edge devices at scale on Linux using X.509 certificates](how-to-provision-devices-at-scale-linux-x509.md)
38
+
> *[Create and provision IoT Edge devices at scale with a TPM on Linux](how-to-provision-devices-at-scale-linux-tpm.md)
39
+
> *[Create and provision IoT Edge devices at scale on Linux using symmetric keys](how-to-provision-devices-at-scale-linux-symmetric.md)
40
40
41
41
## Prerequisites
42
42
@@ -63,7 +63,7 @@ Now that the container engine and the IoT Edge runtime are installed on your dev
@@ -94,7 +94,7 @@ Now that the container engine and the IoT Edge runtime are installed on your dev
94
94
95
95
Update the following fields:
96
96
97
-
***iothub_hostname**: Hostname of the IoT Hub the device connects to. For example, `{IoT hub name}.azure-devices.net`.
97
+
***iothub_hostname**: Hostname of the IoT hub the device connects to. For example, `{IoT hub name}.azure-devices.net`.
98
98
***device_id**: The ID that you provided when you registered the device.
99
99
***identity_cert**: URI to an identity certificate on the device, for example: `file:///path/identity_certificate.pem`. Or, dynamically issue the certificate using EST or a local certificate authority.
100
100
***identity_pk**: URI to the private key file forthe provided identity certificate, for example: `file:///path/identity_key.pem`. Or, provide a PKCS#11 URI and then provide your configuration informationin the
@@ -140,7 +140,7 @@ After entering the provisioning information in the configuration file, apply you
140
140
141
141
Update the following fields:
142
142
143
-
* **iothub_hostname**: Hostname of the IoT Hub where the device connects. For example, `example.azure-devices.net`.
143
+
* **iothub_hostname**: Hostname of the IoT hub where the device connects. For example, `example.azure-devices.net`.
144
144
* **device_id**: The ID that you provided when you registered the device.
145
145
* **identity_cert**: URI to an identity certificate on the device, for example: `file:///var/snap/azure-iot-identity/current/shared/identity_certificate.pem`.
146
146
* **identity_pk**: URI to the private key file for the provided identity certificate, for example: `file:///var/snap/azure-iot-identity/current/shared/identity_key.pem`.
@@ -163,7 +163,7 @@ After entering the provisioning information in the configuration file, apply you
163
163
164
164
To deploy your IoT Edge modules, go to your IoT hub in the Azure portal, then:
165
165
166
-
1. Select **Devices**from the IoT Hub menu.
166
+
1. Select **Devices**, under **Device management**, from the resource menu.
167
167
168
168
1. Select your device to open its page.
169
169
@@ -203,23 +203,23 @@ Use the `check` tool to verify configuration and connection status of the device
203
203
sudo iotedge check
204
204
```
205
205
206
-
You can expect a range of responses that may include **OK** (green), **Warning** (yellow), or **Error** (red). For troubleshooting common errors, see [Solutions to common issues for Azure IoT Edge](troubleshoot-common-errors.md).
206
+
You can expect a range of responses that might include **OK** (green), **Warning** (yellow), or **Error** (red). For troubleshooting common errors, see [Solutions to common issues for Azure IoT Edge](troubleshoot-common-errors.md).
207
207
208
208
:::image type="content" source="media/how-to-provision-single-device-linux-x509/config-checks.png" alt-text="Screenshot of sample responses from the check command." lightbox="media/how-to-provision-single-device-linux-x509/config-checks.png":::
209
209
210
210
>[!TIP]
211
211
>Always use `sudo` to run the check tool, even after your permissions are updated. The tool needs elevated privileges to access the config file to verify configuration status.
212
212
213
213
>[!NOTE]
214
-
>On a newly provisioned device, you may see an error related to IoT Edge Hub:
214
+
>On a newly provisioned device, you might see an error related to IoT Edge Hub:
215
215
>
216
216
>**× production readiness: Edge Hub's storage directory is persisted on the host filesystem - Error**
217
217
>
218
218
>**Could not check current state of edgeHub container**
219
219
>
220
220
>This error is expected on a newly provisioned device because the IoT Edge Hub module isn't running. To resolve the error, in IoT Hub, set the modules for the device and create a deployment. Creating a deployment for the device starts the modules on the device including the IoT Edge Hub module.
221
221
222
-
View all the modules running on your IoT Edge device. When the service starts for the first time, you should only see the **edgeAgent** module running. The edgeAgent module runs by default and helps to install and start any additional modules that you deploy to your device.
222
+
View all the modules running on your IoT Edge device. When the service starts for the first time, you should only see the **edgeAgent** module running. The edgeAgent module runs by default and helps to install and start any other modules that you deploy to your device.
223
223
224
224
```bash
225
225
sudo iotedge list
@@ -229,12 +229,12 @@ When you create a new IoT Edge device, it displays the status code `417 -- The d
229
229
230
230
## Offline or specific version installation (optional)
231
231
232
-
The steps in this section are for scenarios not covered by the standard installation steps. This may include:
232
+
The steps in this section are for scenarios not covered by the standard installation steps. These scenarios might include:
233
233
234
234
* Install IoT Edge while offline
235
235
* Install a release candidate version
236
236
237
-
Use the steps in this section if you want to install a specific version of the Azure IoT Edge runtime that isn't available through your package manager. The Microsoft package list only contains a limited set of recent versions and their sub-versions, so these steps are for anyone who wants to install an older version or a release candidate version.
237
+
Use the steps in this section if you want to install a specific version of the Azure IoT Edge runtime that isn't available through your package manager. The Microsoft package list only contains a limited set of recent versions and their subversions, so these steps are for anyone who wants to install an older version or a release candidate version.
238
238
239
239
If you're using Ubuntu snaps, you can download a snap and install it offline. For more information, see [Download snaps and install offline](https://forum.snapcraft.io/t/download-snaps-and-install-offline/15713).
240
240
@@ -248,7 +248,7 @@ Using curl commands, you can target the component files directly from the IoT Ed
248
248
249
249
1. Find the **aziot-identity-service** file that matches your IoT Edge device's architecture. Right-click on the file link and copy the link address.
250
250
251
-
2. Use the copied link in the following command to install that version of the identity service:
251
+
2. To install that version of the identity service, use the copied link in the following command:
Copy file name to clipboardExpand all lines: articles/iot-edge/includes/iot-edge-generate-device-identity-certs.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
ms.topic: include
3
-
ms.date: 01/04/2024
3
+
ms.date: 05/15/2025
4
4
author: PatAltimore
5
5
ms.author: patricka
6
6
ms.service: azure-iot-edge
@@ -11,7 +11,7 @@ services: iot-edge
11
11
12
12
Manual provisioning with X.509 certificates requires IoT Edge version 1.0.10 or newer.
13
13
14
-
When you provision an IoT Edge device with X.509 certificates, you use what's called a *device identity certificate*. This certificate is only used for provisioning an IoT Edge device and authenticating the device with Azure IoT Hub. It's a leaf certificate that doesn't sign other certificates. The device identity certificate is separate from the certificate authority (CA) certificates that the IoT Edge device presents to modules or downstream devices for verification.
14
+
When you provision an IoT Edge device with X.509 certificates, you use a *device identity certificate*. This certificate is only used for provisioning an IoT Edge device and authenticating the device with Azure IoT Hub. It's a leaf certificate that doesn't sign other certificates. The device identity certificate is separate from the certificate authority (CA) certificates that the IoT Edge device presents to modules or downstream devices for verification.
15
15
16
16
For X.509 certificate authentication, each device's authentication information is provided in the form of *thumbprints* taken from your device identity certificates. These thumbprints are given to IoT Hub at the time of device registration so that the service can recognize the device when it connects.
17
17
@@ -39,4 +39,4 @@ You need the following files for manual provisioning with X.509:
If you don't have certificates available, you can [Create demo certificates to test IoT Edge device features](../how-to-create-test-certificates.md). Follow the instructions in that article to set up certificate creation scripts, create a root CA certificate, and create a IoT Edge device identity certificate. For testing, you can create a single device identity certificate and use the same thumbprint for both primary and secondary thumbprint values when registering the device in IoT Hub.
42
+
If you don't have certificates available, you can [Create demo certificates to test IoT Edge device features](../how-to-create-test-certificates.md). Follow the instructions in that article to set up certificate creation scripts, create a root CA certificate, and create an IoT Edge device identity certificate. For testing, you can create a single device identity certificate and use the same thumbprint for both primary and secondary thumbprint values when registering the device in IoT Hub.
Copy file name to clipboardExpand all lines: articles/iot-edge/includes/iot-edge-register-device-x509.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
ms.topic: include
3
-
ms.date: 07/18/2023
3
+
ms.date: 05/15/2025
4
4
author: PatAltimore
5
5
ms.author: patricka
6
6
ms.service: azure-iot-edge
@@ -17,7 +17,7 @@ In your IoT hub in the Azure portal, IoT Edge devices are created and managed se
17
17
18
18
1. Sign in to the [Azure portal](https://portal.azure.com) and navigate to your IoT hub.
19
19
20
-
1. In the left pane, select **Devices**from the menu, then select **Add Device**.
20
+
1. In the resource menu, expand the **Device management**group and select **Devices**, then select **Add Device** from the command bar.
21
21
22
22
1. On the **Create a device** page, provide the following information:
23
23
@@ -27,7 +27,7 @@ In your IoT hub in the Azure portal, IoT Edge devices are created and managed se
27
27
* Provide the primary and secondary identity certificate thumbprints. Thumbprint values are 40-hex characters for SHA-1 hashes or 64-hex characters for SHA-256 hashes. The Azure portal supports hexadecimal values only. Remove column separators and spaces from the thumbprint values before entering them in the portal. For example, `D2:68:D9:04:9F:1A:4D:6A:FD:84:77:68:7B:C6:33:C0:32:37:51:12` is entered as `D268D9049F1A4D6AFD8477687BC633C032375112`.
28
28
29
29
> [!TIP]
30
-
> If you are testing and want to use one certificate, you can use the same certificate for both the primary and secondary thumbprints.
30
+
> If you're testing and want to use one certificate, you can use the same certificate for both the primary and secondary thumbprints.
31
31
32
32
1. Select **Save**.
33
33
@@ -61,7 +61,7 @@ Devices that use X.509 certificate authentication need their IoT hub name, their
61
61
62
62
# [Portal](#tab/azure-portal)
63
63
64
-
The edge-enabled devices that connect to your IoT hub are listed on the **Devices** page. You can filter the list by device type *IoT Edge devices*.
64
+
The edge-enabled devices that connect to your IoT hub are listed on the **Devices** page. You can filter the list by the device type,*IoT Edge devices*.
65
65
66
66
# [Visual Studio Code](#tab/visual-studio-code)
67
67
@@ -77,6 +77,6 @@ Use the [az iot hub device-identity list](/cli/azure/iot/hub/device-identity) co
77
77
az iot hub device-identity list --hub-name <hub_name_here>
78
78
```
79
79
80
-
Any device that's registered as an IoT Edge device has the property **capabilities.iotEdge** set to **true**.
80
+
Any device registered as an IoT Edge device has the property **capabilities.iotEdge** set to **true**.
0 commit comments