You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-dps/use-hsm-with-sdk.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,21 +29,21 @@ For more information, see IoT Hub Device Provisioning Service [security concepts
29
29
30
30
## Enable authentication for supported attestation mechanisms
31
31
32
-
The SDK authentication mode (X**.**509 or TPM) must be enabled for the physical device or simulator before they can be enrolled in the Azure portal. First, navigate to the root folder for azure-iot-sdk-c. Then run the specified command, depending on the authentication mode you choose:
32
+
The SDK authentication mode (X.509 or TPM) must be enabled for the physical device or simulator before they can be enrolled in the Azure portal. First, navigate to the root folder for azure-iot-sdk-c. Then run the specified command, depending on the authentication mode you choose:
33
33
34
-
### Use X**.**509 with simulator
34
+
### Use X.509 with simulator
35
35
36
-
The provisioning service ships with a Device Identity Composition Engine (DICE) emulator that generates an X**.**509 certificate for authenticating the device. To enable X**.**509 authentication, run the following command:
36
+
The provisioning service ships with a Device Identity Composition Engine (DICE) emulator that generates an **X.509** certificate for authenticating the device. To enable **X.509** authentication, run the following command:
37
37
38
38
```
39
39
cmake -Ddps_auth_type=x509 ..
40
40
```
41
41
42
42
Information regarding hardware with DICE can be found [here](https://azure.microsoft.com/blog/azure-iot-supports-new-security-hardware-to-strengthen-iot-security/).
43
43
44
-
### Use X**.**509 with hardware
44
+
### Use X.509 with hardware
45
45
46
-
The provisioning service can be used with X**.**509 on other hardware. An interface between hardware and the SDK is needed to establish connection. Talk to your HSM manufacturer for information on the interface.
46
+
The provisioning service can be used with **X.509** on other hardware. An interface between hardware and the SDK is needed to establish connection. Talk to your HSM manufacturer for information on the interface.
47
47
48
48
### Use TPM
49
49
@@ -135,15 +135,15 @@ Build the SDK prior to creating device enrollment.
135
135
### TPM
136
136
If you are using TPM, follow instructions in ["Create and provision a simulated device using IoT Hub Device Provisioning Service"](./quick-create-simulated-device.md) to create a device enrollment entry in your Device Provisioning Service and simulate first boot.
137
137
138
-
### X**.**509
138
+
### X.509
139
139
140
140
1. To enroll a device in the provisioning service, you need note down the Endorsement Key and Registration ID for each device, which are displayed in the Provisioning Tool provided by Client SDK. Run the following command to print out the root CA certificate (for enrollment groups) and the leaf certificate (for individual enrollment):
2. Sign in to the Azure portal, click on the **All resources** button on the left-hand menu and open your Device Provisioning service.
145
-
- X**.**509 Individual Enrollment: On the provisioning service summary blade, select **Manage enrollments**. Select **Individual Enrollments** tab and click the **Add** button at the top. Select **X**.**509** as the identity attestation *Mechanism*, upload the leaf certificate as required by the blade. Once complete, click the **Save** button.
146
-
- X**.**509 Group Enrollment: On the provisioning service summary blade, select **Manage enrollments**. Select **Group Enrollments** tab and click the **Add** button at the top. Select **X**.**509** as the identity attestation *Mechanism*, enter a group name and certification name, upload the CA/Intermediate certificate as required by the blade. Once complete, click the **Save** button.
145
+
- **X.509 Individual Enrollment**: On the provisioning service summary blade, select **Manage enrollments**. Select **Individual Enrollments** tab and click the **Add** button at the top. Select **X.509** as the identity attestation *Mechanism*, upload the leaf certificate as required by the blade. Once complete, click the **Save** button.
146
+
- **X.509 Group Enrollment**: On the provisioning service summary blade, select **Manage enrollments**. Select **Group Enrollments** tab and click the **Add** button at the top. Select **X.509** as the identity attestation *Mechanism*, enter a group name and certification name, upload the CA/Intermediate certificate as required by the blade. Once complete, click the **Save** button.
147
147
148
148
## Enable authentication for devices using a custom attestation mechanism (optional)
149
149
@@ -175,7 +175,7 @@ Once your library successfully builds on its own, you need to integrate it with
175
175
176
176
## Connecting to IoT Hub after provisioning
177
177
178
-
Once the device has been provisioned with the provisioning service, this API uses the specified authentication mode (X**.**509 or TPM) to connect with IoT Hub:
178
+
Once the device has been provisioned with the provisioning service, this API uses the specified authentication mode (**X.509** or TPM) to connect with IoT Hub:
0 commit comments