You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-dps/how-to-reprovision.md
+14-8Lines changed: 14 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,19 +18,23 @@ For more a more detailed overview of reprovisioning scenarios, see [IoT Hub Devi
18
18
19
19
## Set the reprovision policy
20
20
21
+
The following steps configure the reprovision policy for an individual enrollment or enrollment group:
22
+
21
23
1. Sign in to the [Azure portal](https://portal.azure.com) and navigate to your Device Provisioning Service instance.
22
24
23
-
2. Select **Manage enrollments**, and then select the enrollment group or individual enrollment that you want to configure for reprovisioning.
25
+
2. Select **Manage enrollments**, and then select either the **Enrollment groups** or **Individual enrollments** tabs.
26
+
27
+
3. Select the name of the enrollment group or individual enrollment that you want to configure for reprovisioning.
24
28
25
-
3. Use the dropdown menu under **Reprovision policy** to choose one of the following reprovisioning policies:
29
+
4. Use the dropdown menu under **Reprovision policy** to choose one of the following reprovisioning policies:
26
30
27
31
***Never reprovision device**.
28
32
29
33
***Reprovision device and reset to initial state**: This policy takes action when devices associated with the enrollment entry submit a new provisioning request. Depending on the enrollment entry configuration, the device may be reassigned to another IoT hub. If the device is changing IoT hubs, the device registration with the initial IoT hub will be removed. The initial configuration data that the provisioning service instance received when the device was provisioned is provided to the new IoT hub. During migration, the device's status will be reported as **Assigning**.
30
34
31
35
***Reprovision device and migrate current state**: This policy takes action when devices associated with the enrollment entry submit a new provisioning request. Depending on the enrollment entry configuration, the device may be reassigned to another IoT hub. If the device is changing IoT hubs, the device registration with the initial IoT hub will be removed. All device state information from that initial IoT hub will be migrated over to the new IoT hub. During migration, the device's status will be reported as **Assigning**
32
36
33
-
4. Select **Save** to enable the reprovisioning of the device based on your changes.
37
+
5. Select **Save** to enable the reprovisioning of the device based on your changes.
34
38
35
39
## Configure the enrollment allocation policy
36
40
@@ -40,11 +44,13 @@ The following steps configure the allocation policy for a device's enrollment:
40
44
41
45
1. Sign in to the [Azure portal](https://portal.azure.com) and navigate to your Device Provisioning Service instance.
42
46
43
-
2. Select **Manage enrollments**, and then select the enrollment group or individual enrollment that you want to configure for reprovisioning.
47
+
2. Select **Manage enrollments**, and then select either the **Enrollment groups** or **Individual enrollments** tabs.
48
+
49
+
3. Select the name of the enrollment group or individual enrollment that you want to configure for reprovisioning.
44
50
45
-
3. On the **Enrollment details** page, select the **IoT hubs** tab.
51
+
4. On the **Enrollment details** page, select the **IoT hubs** tab.
46
52
47
-
4. Select one of the following allocation policies:
53
+
5. Select one of the following allocation policies:
48
54
49
55
***Static**: This policy requires a desired IoT hub be listed in the enrollment entry for a device to be provisioned. This policy allows you to designate a single IoT hub that you want to assign devices to.
50
56
@@ -54,7 +60,7 @@ The following steps configure the allocation policy for a device's enrollment:
54
60
55
61
***Custom (use Azure Function)**: This policy uses a custom webhook hosted in Azure Functions to assign devices to one or more IoT hubs. Custom allocation policies give you more control over how devices are assigned to your IoT hubs. To learn more, see [Understand custom allocation policies](concepts-custom-allocation.md).
56
62
57
-
5. Under **Target IoT hubs**, select the linked IoT hubs that you want included in your allocation policy. Optionally, add a new linked Iot hub using the **Add link to IoT hub** button.
63
+
6. Under **Target IoT hubs**, select the linked IoT hubs that you want included in your allocation policy. Optionally, add a new linked Iot hub using the **Add link to IoT hub** button.
58
64
59
65
* With the **Static configuration** allocation policy, select the IoT hub you want devices assigned to.
60
66
@@ -64,7 +70,7 @@ The following steps configure the allocation policy for a device's enrollment:
64
70
65
71
* With the **Custom** allocation policy, select the IoT hubs you want evaluated for assignment by your custom allocation webhook.
|**Primary certificate file**| Upload the device certificate. For the certificate, use the signed end-entity certificate installed on the device. The device uses the signed end-entity certificate for authentication. |
|**Primary certificate file**| Upload the device certificate. For the certificate, use the signed end-entity certificate installed on the device. The device uses the signed end-entity certificate for authentication. |
98
98
99
99
- If you don't have the device certificate, provide the following values on the **Add enrollment** page:
|**Generate symmetric keys automatically**|: Make sure this checkbox is selected. The keys don't matter for this scenario. |
105
-
|**Registration ID**| If the device has already been provisioned, use its IoT Hub device ID. You can find this in the registration records of the enrollment group, or in the IoT hub that the device was provisioned to. If the device has not yet been provisioned, enter the device certificate CN. (In this latter case, you don't need the device certificate, but you will need to know the CN.) |
|**Generate symmetric keys automatically**|: Make sure this checkbox is selected. The keys don't matter for this scenario. |
105
+
|**Registration ID**| If the device has already been provisioned, use its IoT Hub device ID. You can find this in the registration records of the enrollment group, or in the IoT hub that the device was provisioned to. If the device has not yet been provisioned, enter the device certificate CN. (In this latter case, you don't need the device certificate, but you will need to know the CN.) |
106
106
107
107
1. Scroll to the bottom of the **Add enrollment** page and uncheck the **Enable this enrollment** checkbox.
Copy file name to clipboardExpand all lines: articles/iot-dps/how-to-roll-certificates.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -68,7 +68,7 @@ Updating enrollment entries for rolled certificates is accomplished on the **Man
68
68
69
69
:::image type="content" source="./media/how-to-roll-certificates/manage-enrollments-portal.png" alt-text="Screenshot that shows the Manage enrollments page in the Azure portal.":::
70
70
71
-
1. Select the **Individual enrollments** tab, and select the registration ID entry in the list.
71
+
1. Select the **Individual enrollments** tab, and select the registration ID entry from the list.
72
72
73
73
1. Check the **Remove or replace primary/secondary certificate** checkboxes if you want to delete an existing certificate. Select the file folder icon to browse for and upload the new certificates.
74
74
@@ -122,9 +122,9 @@ If you are rolling certificates to handle certificate expirations, you should us
122
122
123
123
1. Select **Manage enrollments** from the **Settings** section of the navigation menu for your Device Provisioning Service instance, and select the **Enrollment groups** tab.
124
124
125
-
1. Select the group name in the list.
125
+
1. Select the group name grom the list.
126
126
127
-
2. Check the **Remove or replace primary/secondary certificate** checkboxes if you want to delete an existing certificate. Select the file folder icon to browse for and upload the new certificates.
127
+
1. Check the **Remove or replace primary/secondary certificate** checkboxes if you want to delete an existing certificate. Select the file folder icon to browse for and upload the new certificates.
128
128
129
129
If any of your certificates were compromised, you should remove them as soon as possible.
130
130
@@ -133,8 +133,8 @@ If you are rolling certificates to handle certificate expirations, you should us
133
133
Each intermediate certificate should be signed by a verified root CA certificate that has already been added to the provisioning service. For more information, see [X.509 certificates](concepts-x509-attestation.md#x509-certificates).
134
134
135
135
:::image type="content" source="./media/how-to-roll-certificates/enrollment-group-delete-intermediate-cert.png" alt-text="Screenshot that shows replacing an intermediate certificate for an enrollment group.":::
136
-
137
-
3. If you removed a compromised certificate from the provisioning service, the certificate can still be used to make device connections to the IoT hub as long as device registrations for it exists there. You can address this two ways:
136
+
137
+
1. If you removed a compromised certificate from the provisioning service, the certificate can still be used to make device connections to the IoT hub as long as device registrations for it exists there. You can address this two ways:
138
138
139
139
The first way would be to manually navigate to your IoT hub and immediately remove the device registration associated with the compromised certificate. Then when your devices provision again with updated certificates, a new device registration will be created for each one.
0 commit comments