Skip to content

Commit a4ab5d1

Browse files
committed
Added more monikers
1 parent a473352 commit a4ab5d1

File tree

1 file changed

+43
-1
lines changed

1 file changed

+43
-1
lines changed

articles/iot-edge/how-to-manage-device-certificates.md

Lines changed: 43 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ To learn more about the different types of certificates and their roles, see [Un
2727
>[!NOTE]
2828
>The term "root CA" used throughout this article refers to the topmost authority public certificate of the certificate chain for your IoT solution. You do not need to use the certificate root of a syndicated certificate authority, or the root of your organization's certificate authority. In many cases, it is actually an intermediate CA public certificate.
2929
30-
<!--1.2-->
30+
<!-- 1.2 -->
3131
:::moniker range=">=iotedge-2020-11"
3232

3333
## Changes in version 1.2
@@ -36,6 +36,7 @@ To learn more about the different types of certificates and their roles, see [Un
3636
* The **workload CA certificate** was deprecated. Now the IoT Edge security manager generates the IoT Edge hub server certificate directly from the edge CA certificate, without the intermediate workload CA certificate between them.
3737

3838
:::moniker-end
39+
<!-- end-1.2 -->
3940

4041
### Prerequisites
4142

@@ -51,9 +52,21 @@ To learn more about the different types of certificates and their roles, see [Un
5152

5253
You should use your own certificate authority to create the following files:
5354

55+
<!-- 1.2 -->
56+
:::moniker range=">=iotedge-2020-11"
5457
* Root CA
5558
* Edge CA certificate
5659
* Edge CA private key
60+
:::moniker-end
61+
<!-- end-1.2 -->
62+
63+
<!-- 1.1 -->
64+
:::moniker range="iotedge-2018-06"
65+
* Root CA
66+
* Device CA certificate
67+
* Device CA private key
68+
:::moniker-end
69+
<!-- end-1.1 -->
5770

5871
In this article, what we refer to as the *root CA* is not the topmost certificate authority for an organization. It's the topmost certificate authority for the IoT Edge scenario, which the IoT Edge hub module, user modules, and any downstream devices use to establish trust between each other.
5972

@@ -64,6 +77,7 @@ In this article, what we refer to as the *root CA* is not the topmost certificat
6477
> Currently, a limitation in libiothsm prevents the use of certificates that expire on or after January 1, 2038.
6578
6679
:::moniker-end
80+
<!-- end-1.1 -->
6781

6882
To see an example of these certificates, review the scripts that create demo certificates in [Managing test CA certificates for samples and tutorials](https://github.com/Azure/iotedge/tree/master/tools/CACertificates).
6983

@@ -75,9 +89,21 @@ Copy the three certificate and key files onto your IoT Edge device.
7589

7690
If you used the sample scripts to [create demo certificates](how-to-create-test-certificates.md), the three certificate and key files are located at the following paths:
7791

92+
<!-- 1.2 -->
93+
:::moniker range=">=iotedge-2020-11"
7894
* Edge CA certificate: `<WRKDIR>\certs\iot-edge-device-MyEdgeDeviceCA-full-chain.cert.pem`
7995
* Edge CA private key: `<WRKDIR>\private\iot-edge-device-MyEdgeDeviceCA.key.pem`
8096
* Root CA: `<WRKDIR>\certs\azure-iot-test-only.root.ca.cert.pem`
97+
:::moniker-end
98+
<!-- end-1.2 -->
99+
100+
<!-- 1.1 -->
101+
:::moniker range="iotedge-2018-06"
102+
* Device CA certificate: `<WRKDIR>\certs\iot-edge-device-MyEdgeDeviceCA-full-chain.cert.pem`
103+
* Device CA private key: `<WRKDIR>\private\iot-edge-device-MyEdgeDeviceCA.key.pem`
104+
* Root CA: `<WRKDIR>\certs\azure-iot-test-only.root.ca.cert.pem`
105+
:::moniker-end
106+
<!-- end-1.1 -->
81107

82108
You can use a service like [Azure Key Vault](../key-vault/index.yml) or a function like [Secure copy protocol](https://www.ssh.com/ssh/scp/) to move the certificate files. If you generated the certificates on the IoT Edge device itself, you can skip this step and use the path to the working directory.
83109

@@ -190,8 +216,19 @@ If you are using IoT Edge for Linux on Windows, you need to use the SSH key loca
190216

191217
IoT Edge automatically generates certificates on the device in several cases, including:
192218

219+
<!-- 1.2 -->
220+
:::moniker range=">=iotedge-2020-11"
193221
* If you don't provide your own production certificates when you install and provision IoT Edge, the IoT Edge security manager automatically generates a **edge CA certificate**. This self-signed certificate is only meant for development and testing scenarios, not production. This certificate expires after 90 days.
194222
* The IoT Edge security manager also generates a **workload CA certificate** signed by the edge CA certificate
223+
:::moniker-end
224+
<!-- end 1.2 -->
225+
226+
<!-- 1.1. -->
227+
:::moniker range="iotedge-2018-06"
228+
* If you don't provide your own production certificates when you install and provision IoT Edge, the IoT Edge security manager automatically generates a **device CA certificate**. This self-signed certificate is only meant for development and testing scenarios, not production. This certificate expires after 90 days.
229+
* The IoT Edge security manager also generates a **workload CA certificate** signed by the device CA certificate
230+
:::moniker-end
231+
<!-- end 1.1 -->
195232

196233
For more information about the function of the different certificates on an IoT Edge device, see [Understand how Azure IoT Edge uses certificates](iot-edge-certs.md).
197234

@@ -200,10 +237,15 @@ For these two automatically generated certificates, you have the option of setti
200237
>[!NOTE]
201238
>There is a third auto-generated certificate that the IoT Edge security manager creates, the **IoT Edge hub server certificate**. This certificate always has a 30 day lifetime, but is automatically renewed before expiring. The auto-generated CA lifetime value set in the config file doesn't affect this certificate.
202239

240+
<!-- 1.2 -->
241+
:::moniker range=">=iotedge-2020-11"
203242
Upon expiry after the specified number of days, IoT Edge has to be restarted to regenerate the edge CA certificate. The edge CA certificate won't be renewed automatically.
243+
:::moniker-end
244+
<!-- end 1.2 -->
204245

205246
<!-- 1.1. -->
206247
:::moniker range="iotedge-2018-06"
248+
Upon expiry after the specified number of days, IoT Edge has to be restarted to regenerate the device CA certificate. The device CA certificate won't be renewed automatically.
207249

208250
# [Linux containers](#tab/linux)
209251

0 commit comments

Comments
 (0)