Skip to content

Commit 91ad8cd

Browse files
Merge pull request #284090 from PatAltimore/patricka-uuf-edge-ca
Update Edge CA cert naming
2 parents 5521764 + 51408ce commit 91ad8cd

7 files changed

+31
-31
lines changed

articles/iot-edge/how-to-connect-downstream-device.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: How to configure downstream devices to connect to Azure IoT Edge ga
44
author: PatAltimore
55

66
ms.author: patricka
7-
ms.date: 06/10/2024
7+
ms.date: 08/07/2024
88
ms.topic: conceptual
99
ms.service: iot-edge
1010
services: iot-edge
@@ -47,7 +47,7 @@ Acquire the following to prepare your downstream device:
4747

4848
* A root CA certificate file.
4949

50-
This file was used to generate the device CA certificate in [Configure an IoT Edge device to act as a transparent gateway](how-to-create-transparent-gateway.md), which is available on your downstream device.
50+
This file was used to generate the Edge CA certificate in [Configure an IoT Edge device to act as a transparent gateway](how-to-create-transparent-gateway.md), which is available on your downstream device.
5151

5252
Your downstream device uses this certificate to validate the identity of the gateway device. This trusted certificate validates the transport layer security (TLS) connections to the gateway device. See usage details in the [Provide the root CA certificate](#provide-the-root-ca-certificate) section.
5353

articles/iot-edge/how-to-connect-downstream-iot-edge-device.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: How to create a trusted connection between an IoT Edge gateway and
44
author: PatAltimore
55

66
ms.author: patricka
7-
ms.date: 05/15/2024
7+
ms.date: 08/07/2024
88
ms.topic: conceptual
99
ms.service: iot-edge
1010
services: iot-edge
@@ -90,7 +90,7 @@ Additional device-identity commands, including `add-children`,`list-children`, a
9090
9191
## Generate certificates
9292

93-
A consistent chain of certificates must be installed across devices in the same gateway hierarchy to establish a secure communication between themselves. Every device in the hierarchy, whether an IoT Edge device or an IoT downstream device, needs a copy of the same root CA certificate. Each IoT Edge device in the hierarchy then uses that root CA certificate as the root for its device CA certificate.
93+
A consistent chain of certificates must be installed across devices in the same gateway hierarchy to establish a secure communication between themselves. Every device in the hierarchy, whether an IoT Edge device or an IoT downstream device, needs a copy of the same root CA certificate. Each IoT Edge device in the hierarchy then uses that root CA certificate as the root for its Edge CA certificate.
9494

9595
With this setup, each downstream IoT Edge device can verify the identity of their parent by verifying that the *edgeHub* they connect to has a server certificate that is signed by the shared root CA certificate.
9696

@@ -103,11 +103,11 @@ For more information about IoT Edge certificate requirements, see
103103

104104
* A **root CA certificate**, which is the topmost shared certificate for all the devices in a given gateway hierarchy. This certificate is installed on all devices.
105105
* Any **intermediate certificates** that you want to include in the root certificate chain.
106-
* A **device CA certificate** and its **private key**, generated by the root and intermediate certificates. You need one unique device CA certificate for each IoT Edge device in the gateway hierarchy.
106+
* An **Edge CA certificate** and its **private key**, generated by the root and intermediate certificates. You need one unique Edge CA certificate for each IoT Edge device in the gateway hierarchy.
107107

108108
You can use either a self-signed certificate authority or purchase one from a trusted commercial certificate authority like Baltimore, Verisign, Digicert, or GlobalSign.
109109

110-
01. If you don't have your own certificates to use for test, create one set of root and intermediate certificates, then create IoT Edge device CA certificates for each device. In this article, we'll use test certificates generated using [test CA certificates for samples and tutorials](https://github.com/Azure/iotedge/tree/main/tools/CACertificates).
110+
01. If you don't have your own certificates to use for test, create one set of root and intermediate certificates, then create Edge CA certificates for each device. In this article, we'll use test certificates generated using [test CA certificates for samples and tutorials](https://github.com/Azure/iotedge/tree/main/tools/CACertificates).
111111
For example, the following commands create a root CA certificate, a parent device certificate, and a child device certificate.
112112

113113
```bash
@@ -138,11 +138,11 @@ For more information on installing certificates on a device, see [Manage certifi
138138

139139
To configure your parent device, open a local or remote command shell.
140140

141-
To enable secure connections, every IoT Edge parent device in a gateway scenario needs to be configured with a unique device CA certificate and a copy of the root CA certificate shared by all devices in the gateway hierarchy.
141+
To enable secure connections, every IoT Edge parent device in a gateway scenario needs to be configured with a unique Edge CA certificate and a copy of the root CA certificate shared by all devices in the gateway hierarchy.
142142

143143
01. Check your certificates meet the [format requirements](how-to-manage-device-certificates.md#format-requirements).
144144

145-
01. Transfer the **root CA certificate**, **parent device CA certificate**, and **parent private key** to the parent device.
145+
01. Transfer the **root CA certificate**, **parent Edge CA certificate**, and **parent private key** to the parent device.
146146

147147
01. Copy the certificates and keys to the correct directories. The preferred directories for device certificates are `/var/aziot/certs` for the certificates and `/var/aziot/secrets` for keys.
148148

@@ -393,11 +393,11 @@ To verify the *hostname*, you need to inspect the environment variables of the *
393393
394394
To configure your downstream device, open a local or remote command shell.
395395
396-
To enable secure connections, every IoT Edge downstream device in a gateway scenario needs to be configured with a unique device CA certificate and a copy of the root CA certificate shared by all devices in the gateway hierarchy.
396+
To enable secure connections, every IoT Edge downstream device in a gateway scenario needs to be configured with a unique Edge CA certificate and a copy of the root CA certificate shared by all devices in the gateway hierarchy.
397397
398398
01. Check your certificates meet the [format requirements](how-to-manage-device-certificates.md#format-requirements).
399399
400-
01. Transfer the **root CA certificate**, **child device CA certificate**, and **child private key** to the downstream device.
400+
01. Transfer the **root CA certificate**, **child Edge CA certificate**, and **child private key** to the downstream device.
401401
402402
01. Copy the certificates and keys to the correct directories. The preferred directories for device certificates are `/var/aziot/certs` for the certificates and `/var/aziot/secrets` for keys.
403403

articles/iot-edge/how-to-create-test-certificates.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -223,11 +223,11 @@ Device identity certificates go in the **Provisioning** section of the config fi
223223
224224
---
225225
226-
## Create edge CA certificates
226+
## Create Edge CA certificates
227227
228-
These certificates are required for **gateway scenarios** because the edge CA certificate is how the IoT Edge device verifies its identity to downstream devices. You can skip this section if you're not connecting any downstream devices to IoT Edge.
228+
These certificates are required for **gateway scenarios** because the Edge CA certificate is how the IoT Edge device verifies its identity to downstream devices. You can skip this section if you're not connecting any downstream devices to IoT Edge.
229229
230-
The **edge CA** certificate is also responsible for creating certificates for modules running on the device, but IoT Edge runtime can create temporary certificates if edge CA isn't configured. Edge CA certificates go in the **Edge CA** section of the `config.toml` file on the IoT Edge device. To learn more, see [Understand how Azure IoT Edge uses certificates](iot-edge-certs.md).
230+
The **Edge CA** certificate is also responsible for creating certificates for modules running on the device, but IoT Edge runtime can create temporary certificates if Edge CA isn't configured. Edge CA certificates go in the **Edge CA** section of the `config.toml` file on the IoT Edge device. To learn more, see [Understand how Azure IoT Edge uses certificates](iot-edge-certs.md).
231231
232232
# [Windows](#tab/windows)
233233

articles/iot-edge/how-to-create-transparent-gateway.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Use an Azure IoT Edge device as a transparent gateway that can proc
44
author: PatAltimore
55

66
ms.author: patricka
7-
ms.date: 06/03/2024
7+
ms.date: 08/07/2024
88
ms.topic: conceptual
99
ms.service: iot-edge
1010
services: iot-edge
@@ -56,21 +56,21 @@ If you don't have a device ready, you should create one before continuing with t
5656

5757
---
5858

59-
## Set up the device CA certificate
59+
## Set up the Edge CA certificate
6060

61-
All IoT Edge gateways need a device CA certificate installed on them. The IoT Edge security daemon uses the IoT Edge device CA certificate to sign a workload CA certificate, which in turn signs a server certificate for IoT Edge hub. The gateway presents its server certificate to the downstream device during the initiation of the connection. The downstream device checks to make sure that the server certificate is part of a certificate chain that rolls up to the root CA certificate. This process allows the downstream device to confirm that the gateway comes from a trusted source. For more information, see [Understand how Azure IoT Edge uses certificates](iot-edge-certs.md).
61+
All IoT Edge gateways need an Edge CA certificate installed on them. The IoT Edge security daemon uses the Edge CA certificate to sign a workload CA certificate, which in turn signs a server certificate for IoT Edge hub. The gateway presents its server certificate to the downstream device during the initiation of the connection. The downstream device checks to make sure that the server certificate is part of a certificate chain that rolls up to the root CA certificate. This process allows the downstream device to confirm that the gateway comes from a trusted source. For more information, see [Understand how Azure IoT Edge uses certificates](iot-edge-certs.md).
6262

6363
:::image type="content" source="./media/how-to-create-transparent-gateway/gateway-setup.png" alt-text="Screenshot that shows the gateway certificate setup." lightbox="./media/how-to-create-transparent-gateway/gateway-setup.png":::
6464

65-
The root CA certificate and the device CA certificate (with its private key) need to be present on the IoT Edge gateway device and configured in the IoT Edge config file. Remember that in this case *root CA certificate* means the topmost certificate authority for this IoT Edge scenario. The gateway device CA certificate and the downstream device certificates need to roll up to the same root CA certificate.
65+
The root CA certificate and the Edge CA certificate (with its private key) need to be present on the IoT Edge gateway device and configured in the IoT Edge config file. Remember that in this case *root CA certificate* means the topmost certificate authority for this IoT Edge scenario. The gateway Edge CA certificate and the downstream device certificates need to roll up to the same root CA certificate.
6666

6767
>[!TIP]
68-
>The process of installing the root CA certificate and device CA certificate on an IoT Edge device is also explained in more detail in [Manage certificates on an IoT Edge device](how-to-manage-device-certificates.md).
68+
>The process of installing the root CA certificate and Edge CA certificate on an IoT Edge device is also explained in more detail in [Manage certificates on an IoT Edge device](how-to-manage-device-certificates.md).
6969
7070
Have the following files ready:
7171

7272
* Root CA certificate
73-
* Device CA certificate
73+
* Edge CA certificate
7474
* Device CA private key
7575

7676
For production scenarios, you should generate these files with your own certificate authority. For development and test scenarios, you can use demo certificates.
@@ -81,7 +81,7 @@ If you don't have your own certificate authority and want to use demo certificat
8181

8282
1. To start, set up the scripts for generating certificates on your device.
8383
1. Create a root CA certificate. At the end of those instructions, you'll have a root CA certificate file `<path>/certs/azure-iot-test-only.root.ca.cert.pem`.
84-
1. Create IoT Edge device CA certificates. At the end of those instructions, you'll have a device CA certificate `<path>/certs/iot-edge-device-ca-<cert name>-full-chain.cert.pem` its private key `<path>/private/iot-edge-device-ca-<cert name>.key.pem`.
84+
1. Create Edge CA certificates. At the end of those instructions, you'll have an Edge CA certificate `<path>/certs/iot-edge-device-ca-<cert name>-full-chain.cert.pem` its private key `<path>/private/iot-edge-device-ca-<cert name>.key.pem`.
8585

8686
### Copy certificates to device
8787

@@ -127,7 +127,7 @@ For more information on the following commands, see [PowerShell functions for Io
127127
1. Copy the certificates to the EFLOW virtual machine to a directory where you have write access. For example, the `/home/iotedge-user` home directory.
128128

129129
```powershell
130-
# Copy the IoT Edge device CA certificate and key
130+
# Copy the Edge CA certificate and key
131131
Copy-EflowVMFile -fromFile <path>\certs\iot-edge-device-ca-<cert name>-full-chain.cert.pem -toFile ~/iot-edge-device-ca-<cert name>-full-chain.cert.pem -pushFile
132132
Copy-EflowVMFile -fromFile <path>\private\iot-edge-device-ca-<cert name>.key.pem -toFile ~/iot-edge-device-ca-<cert name>.key.pem -pushFile
133133
@@ -158,7 +158,7 @@ For more information on the following commands, see [PowerShell functions for Io
158158
1. Move the certificates and keys to the preferred `/var/aziot` directory.
159159

160160
```bash
161-
# Move the IoT Edge device CA certificate and key to preferred location
161+
# Move the Edge CA certificate and key to preferred location
162162
sudo mv ~/azure-iot-test-only.root.ca.cert.pem /var/aziot/certs
163163
sudo mv ~/iot-edge-device-ca-<cert name>-full-chain.cert.pem /var/aziot/certs
164164
sudo mv ~/iot-edge-device-ca-<cert name>.key.pem /var/aziot/secrets
@@ -198,7 +198,7 @@ For more information on the following commands, see [PowerShell functions for Io
198198
1. Find the `trust_bundle_cert` parameter. Uncomment this line and provide the file URI to the root CA certificate file on your device.
199199

200200
1. Find the `[edge_ca]` section of the file. Uncomment the three lines in this section and provide the file URIs to your certificate and key files as values for the following properties:
201-
* **cert**: device CA certificate
201+
* **cert**: Edge CA certificate
202202
* **pk**: device CA private key
203203

204204
1. Save and close the file.

articles/iot-edge/iot-edge-certs.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,10 @@
22
title: Understand how IoT Edge uses certificates for security
33
titleSuffix: Azure IoT Edge
44
description: How Azure IoT Edge uses certificate to validate devices, modules, and downstream devices enabling secure connections between them.
5-
author: jlian
5+
author: PatAltimore
66

7-
ms.author: jlian
8-
ms.date: 07/05/2023
7+
ms.author: patricka
8+
ms.date: 08/07/2024
99
ms.topic: conceptual
1010
ms.service: iot-edge
1111
services: iot-edge
@@ -386,7 +386,7 @@ In a typical manufacturing process for creating secure devices, root CA certific
386386
* Multiple companies involved serially in the production of a device
387387
* A customer buying a root CA and deriving a signing certificate for the manufacturer to sign the devices they make on that customer's behalf
388388

389-
In any case, the manufacturer uses an intermediate CA certificate at the end of this chain to sign the edge CA certificate placed on the end device. These intermediate certificates are closely guarded at the manufacturing plant. They undergo strict processes, both physical and electronic for their usage.
389+
In any case, the manufacturer uses an intermediate CA certificate at the end of this chain to sign the Edge CA certificate placed on the end device. These intermediate certificates are closely guarded at the manufacturing plant. They undergo strict processes, both physical and electronic for their usage.
390390

391391
## Next steps
392392

articles/iot-edge/iot-edge-limits-and-restrictions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ IoT Hub has the following restrictions for IoT Edge automatic deployments:
6060
IoT Edge certificates have the following restrictions:
6161

6262
* The common name (CN) can't be the same as the *hostname* that is used in the configuration file on the IoT Edge device.
63-
* The name used by clients to connect to IoT Edge can't be the same as the common name used in the edge CA certificate.
63+
* The name used by clients to connect to IoT Edge can't be the same as the common name used in the Edge CA certificate.
6464

6565
For more information, see [Certificates for device security](iot-edge-certs.md).
6666

articles/iot-edge/production-checklist.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Ready your Azure IoT Edge solution for production. Learn how to set
44
author: PatAltimore
55

66
ms.author: patricka
7-
ms.date: 06/13/2024
7+
ms.date: 08/07/2024
88
ms.topic: concept-article
99
ms.service: iot-edge
1010
services: iot-edge
@@ -33,9 +33,9 @@ IoT Edge devices can be anything from a Raspberry Pi to a laptop to a virtual ma
3333

3434
### Install production certificates
3535

36-
Every IoT Edge device in production needs a device certificate authority (CA) certificate installed on it. That CA certificate is then declared to the IoT Edge runtime in the config file. For development and testing scenarios, the IoT Edge runtime creates temporary certificates if no certificates are declared in the config file. However, these temporary certificates expire after three months and aren't secure for production scenarios. For production scenarios, you should provide your own device CA certificate, either from a self-signed certificate authority or purchased from a commercial certificate authority.
36+
Every IoT Edge device in production needs a device certificate authority (CA) certificate installed on it. That CA certificate is then declared to the IoT Edge runtime in the config file. For development and testing scenarios, the IoT Edge runtime creates temporary certificates if no certificates are declared in the config file. However, these temporary certificates expire after three months and aren't secure for production scenarios. For production scenarios, you should provide your own Edge CA certificate, either from a self-signed certificate authority or purchased from a commercial certificate authority.
3737

38-
To understand the role of the device CA certificate, see [How Azure IoT Edge uses certificates](iot-edge-certs.md).
38+
To understand the role of the Edge CA certificate, see [How Azure IoT Edge uses certificates](iot-edge-certs.md).
3939

4040
For more information about how to install certificates on an IoT Edge device and reference them from the config file, see [Manage certificate on an IoT Edge device](how-to-manage-device-certificates.md).
4141

0 commit comments

Comments
 (0)