You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-edge/how-to-manage-device-certificates.md
+43-1Lines changed: 43 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ To learn more about the different types of certificates and their roles, see [Un
27
27
>[!NOTE]
28
28
>The term "root CA" used throughout this article refers to the topmost authority public certificate of the certificate chain for your IoT solution. You do not need to use the certificate root of a syndicated certificate authority, or the root of your organization's certificate authority. In many cases, it is actually an intermediate CA public certificate.
29
29
30
-
<!--1.2-->
30
+
<!--1.2-->
31
31
:::moniker range=">=iotedge-2020-11"
32
32
33
33
## Changes in version 1.2
@@ -36,6 +36,7 @@ To learn more about the different types of certificates and their roles, see [Un
36
36
* The **workload CA certificate** was deprecated. Now the IoT Edge security manager generates the IoT Edge hub server certificate directly from the edge CA certificate, without the intermediate workload CA certificate between them.
37
37
38
38
:::moniker-end
39
+
<!-- end-1.2 -->
39
40
40
41
### Prerequisites
41
42
@@ -51,9 +52,21 @@ To learn more about the different types of certificates and their roles, see [Un
51
52
52
53
You should use your own certificate authority to create the following files:
53
54
55
+
<!-- 1.2 -->
56
+
:::moniker range=">=iotedge-2020-11"
54
57
* Root CA
55
58
* Edge CA certificate
56
59
* Edge CA private key
60
+
:::moniker-end
61
+
<!-- end-1.2 -->
62
+
63
+
<!-- 1.1 -->
64
+
:::moniker range="iotedge-2018-06"
65
+
* Root CA
66
+
* Device CA certificate
67
+
* Device CA private key
68
+
:::moniker-end
69
+
<!-- end-1.1 -->
57
70
58
71
In this article, what we refer to as the *root CA* is not the topmost certificate authority for an organization. It's the topmost certificate authority for the IoT Edge scenario, which the IoT Edge hub module, user modules, and any downstream devices use to establish trust between each other.
59
72
@@ -64,6 +77,7 @@ In this article, what we refer to as the *root CA* is not the topmost certificat
64
77
> Currently, a limitation in libiothsm prevents the use of certificates that expire on or after January 1, 2038.
65
78
66
79
:::moniker-end
80
+
<!-- end-1.1 -->
67
81
68
82
To see an example of these certificates, review the scripts that create demo certificates in [Managing test CA certificates for samples and tutorials](https://github.com/Azure/iotedge/tree/master/tools/CACertificates).
69
83
@@ -75,9 +89,21 @@ Copy the three certificate and key files onto your IoT Edge device.
75
89
76
90
If you used the sample scripts to [create demo certificates](how-to-create-test-certificates.md), the three certificate and key files are located at the following paths:
77
91
92
+
<!-- 1.2 -->
93
+
:::moniker range=">=iotedge-2020-11"
78
94
* Edge CA certificate: `<WRKDIR>\certs\iot-edge-device-MyEdgeDeviceCA-full-chain.cert.pem`
79
95
* Edge CA private key: `<WRKDIR>\private\iot-edge-device-MyEdgeDeviceCA.key.pem`
You can use a service like [Azure Key Vault](../key-vault/index.yml) or a function like [Secure copy protocol](https://www.ssh.com/ssh/scp/) to move the certificate files. If you generated the certificates on the IoT Edge device itself, you can skip this step and use the path to the working directory.
83
109
@@ -190,8 +216,19 @@ If you are using IoT Edge for Linux on Windows, you need to use the SSH key loca
190
216
191
217
IoT Edge automatically generates certificates on the device in several cases, including:
192
218
219
+
<!-- 1.2 -->
220
+
:::moniker range=">=iotedge-2020-11"
193
221
* If you don't provide your own production certificates when you install and provision IoT Edge, the IoT Edge security manager automatically generates a **edge CA certificate**. This self-signed certificate is only meant for development and testing scenarios, not production. This certificate expires after 90 days.
194
222
* The IoT Edge security manager also generates a **workload CA certificate** signed by the edge CA certificate
223
+
:::moniker-end
224
+
<!-- end 1.2 -->
225
+
226
+
<!-- 1.1. -->
227
+
:::moniker range="iotedge-2018-06"
228
+
* If you don't provide your own production certificates when you install and provision IoT Edge, the IoT Edge security manager automatically generates a **device CA certificate**. This self-signed certificate is only meant for development and testing scenarios, not production. This certificate expires after 90 days.
229
+
* The IoT Edge security manager also generates a **workload CA certificate** signed by the device CA certificate
230
+
:::moniker-end
231
+
<!-- end 1.1 -->
195
232
196
233
For more information about the function of the different certificates on an IoT Edge device, see [Understand how Azure IoT Edge uses certificates](iot-edge-certs.md).
197
234
@@ -200,10 +237,15 @@ For these two automatically generated certificates, you have the option of setti
200
237
>[!NOTE]
201
238
>There is a third auto-generated certificate that the IoT Edge security manager creates, the **IoT Edge hub server certificate**. This certificate always has a 30 day lifetime, but is automatically renewed before expiring. The auto-generated CA lifetime value set in the config file doesn't affect this certificate.
202
239
240
+
<!-- 1.2 -->
241
+
:::moniker range=">=iotedge-2020-11"
203
242
Upon expiry after the specified number of days, IoT Edge has to be restarted to regenerate the edge CA certificate. The edge CA certificate won't be renewed automatically.
243
+
:::moniker-end
244
+
<!-- end 1.2 -->
204
245
205
246
<!-- 1.1. -->
206
247
:::moniker range="iotedge-2018-06"
248
+
Upon expiry after the specified number of days, IoT Edge has to be restarted to regenerate the device CA certificate. The device CA certificate won't be renewed automatically.
0 commit comments