You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-dps/tutorial-set-up-cloud.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,9 +23,9 @@ This tutorial shows how to set up the cloud for automatic device provisioning us
23
23
24
24
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/) before you begin.
25
25
26
-
## Log in to the Azure portal
26
+
## Sign in to the Azure portal
27
27
28
-
Log in to the [Azure portal](https://portal.azure.com/).
28
+
Sign in to the [Azure portal](https://portal.azure.com/).
29
29
30
30
## Create a Device Provisioning Service instance and get the ID scope
31
31
@@ -45,9 +45,9 @@ Follow these steps to create a new Device Provisioning Service instance.
45
45
46
46

47
47
48
-
5. Click **Create**. After a few moments the Device Provisioning Service instance is created and the **Overview**tab is displayed.
49
-
6. On the **Overview**tab for the new service instance, copy the value for the **ID scope** for use later. That value is used to identify registration IDs, and provides a guarantee that the registration ID is unique.
50
-
7. Also copy the **Service endpoint** value for later use.
48
+
5. Click **Create**. After a few moments, the Device Provisioning Service instance is created and the **Overview**page is displayed.
49
+
6. On the **Overview**page for the new service instance, copy the value for the **ID scope** for use later. That value is used to identify registration IDs, and provides a guarantee that the registration ID is unique.
50
+
7. Also, copy the **Service endpoint** value for later use.
@@ -60,11 +60,11 @@ The next step is to link the Device Provisioning Service and IoT hub so that the
60
60
1. In the **All resources** page, click the Device Provisioning Service instance you created previously.
61
61
2. In the Device Provisioning Service page, click **Linked IoT hubs**.
62
62
3. Click **Add**.
63
-
4. In the **Add link to IoT hub** page, provide the following information and click **Save**:
63
+
4. In the **Add link to IoT hub** page, provide the following information, and click **Save**:
64
64
65
-
***Subscription** : Make sure the subscription that contains the IoT hub is selected. You can link to IoT hub that resides in a different subscription.
66
-
***IoT hub** : Choose the name of the IoT hub that you want to link with this Device Provisioning Service instance.
67
-
***Access Policy**: Select **iothubowner** to use those credientals for the IoT hub.
65
+
***Subscription:** Make sure the subscription that contains the IoT hub is selected. You can link to IoT hub that resides in a different subscription.
66
+
***IoT hub:** Choose the name of the IoT hub that you want to link with this Device Provisioning Service instance.
67
+
***Access Policy:** Select **iothubowner**as the credentials to use for establishing the link to the IoT hub.
68
68
69
69

70
70
@@ -73,7 +73,7 @@ The next step is to link the Device Provisioning Service and IoT hub so that the
73
73
The allocation policy is a IoT Hub Device Provisioning Service setting that determines how devices are assigned to an IoT hub. There are three supported allocation policies:
74
74
75
75
1.**Lowest latency**: Devices are provisioned to an IoT hub based on the hub with the lowest latency to the device.
76
-
2.**Evenly weighted distribution** (default): Linked IoT hubs are equally likely to have devices provisioned to them. This is the default setting. If you are provisioning devices to only one IoT hub, you can keep this setting.
76
+
2.**Evenly weighted distribution** (default): Linked IoT hubs are equally likely to have devices provisioned to them. This setting is the default. If you are provisioning devices to only one IoT hub, you can keep this setting.
77
77
3.**Static configuration via the enrollment list**: Specification of the desired IoT hub in the enrollment list takes priority over the Device Provisioning Service-level allocation policy.
78
78
79
79
To set the allocation policy, in the Device Provisioning Service page click **Manage allocation policy**. Make sure the allocation policy is set to **Evenly weighted distribution** (the default). If you make any changes, click **Save** when you are done.
Copy file name to clipboardExpand all lines: articles/iot-dps/tutorial-set-up-device.md
+10-9Lines changed: 10 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ In the previous tutorial, you learned how to set up the Azure IoT Hub Device Pro
20
20
> * Extract the security artifacts
21
21
> * Create the device registration software
22
22
23
-
This tutorial expect that you have already created your Device Provisioning Service instance and an IoT hub, using the instructions in the previous [1 - Set up cloud resources](./tutorial-set-up-cloud.md) tutorial.
23
+
This tutorial expects that you have already created your Device Provisioning Service instance and an IoT hub, using the instructions in the previous [Set up cloud resources](tutorial-set-up-cloud.md) tutorial.
24
24
25
25
This tutorial uses the [Azure IoT SDKs and libraries for C repository](https://github.com/Azure/azure-iot-sdk-c), which contains the Device Provisioning Service Client SDK for C. The SDK currently provides TPM and X.509 support for devices running on Windows or Ubuntu implementations. This tutorial is based on use of a Windows development client, which also assumes basic proficiency with Visual Studio 2017.
26
26
@@ -80,7 +80,8 @@ The Device Provisioning Service Client SDK helps you implement your device regis
80
80
cmake -Duse_prov_client:BOOL=ON ..
81
81
```
82
82
83
-
Now you're ready to use the SDK to build your device registration code.
83
+
84
+
Now you're ready to use the SDK to build your device registration code.
84
85
85
86
<a id="extractsecurity"></a>
86
87
@@ -90,18 +91,18 @@ The next step is to extract the security artifacts for the attestation mechanism
90
91
91
92
### Physical devices
92
93
93
-
Depending on whether you built the SDK to use attestation from a physical TPM/HSM or using X.509 certificates, gathering the security artifacts differ as follows:
94
+
Depending on whether you built the SDK to use attestation for a physical TPM/HSM or using X.509 certificates, gathering the security artifacts is as follows:
94
95
95
96
- For a TPM device, you need to determine the **Endorsement Key** associated with it from the TPM chip manufacturer. You can derive a unique **Registration ID** for your TPM device by hashing the endorsement key.
96
97
97
-
- For an X.509 device, you need to obtain the certificates issued to your device(s). The provisioning service exposes two types enrollment entries that control access for devices using the X.509 attestation mechanism. The certificates needed depend on the enrollment types you will be using.
98
+
- For an X.509 device, you need to obtain the certificates issued to your device(s). The provisioning service exposes two types of enrollment entries that control access for devices using the X.509 attestation mechanism. The certificates needed depend on the enrollment types you will be using.
98
99
99
-
1. Individual enrollments: Enrollment for a specific single device. This type of enrollment entry requires [end-entity, "leaf", certificates](concepts-security.md#end-entity-leaf-certificate).
100
-
2. Enrollment groups: This type of enrollment entry requires intermediate or root certificates. For more information, see [Controlling device access to the provisioning service with X.509 certificates](concepts-security.md#controlling-device-access-to-the-provisioning-service-with-x509-certificates).
100
+
1. Individual enrollments: Enrollment for a specific single device. This type of enrollment entry requires [end-entity, "leaf", certificates](concepts-security.md#end-entity-leaf-certificate).
101
+
2. Enrollment groups: This type of enrollment entry requires intermediate or root certificates. For more information, see [Controlling device access to the provisioning service with X.509 certificates](concepts-security.md#controlling-device-access-to-the-provisioning-service-with-x509-certificates).
101
102
102
103
### Simulated devices
103
104
104
-
Depending on whether you built the SDK to use attestation from a simulated device using TPM or X.509 certificates, gathering the security artifacts differ as follows:
105
+
Depending on whether you built the SDK to use attestation for a simulated device using TPM or X.509 certificates, gathering the security artifacts is as follows:
105
106
106
107
- For a simulated TPM device:
107
108
@@ -120,15 +121,15 @@ Depending on whether you built the SDK to use attestation from a simulated devic
120
121
121
122
3. In the *Solution Explorer* pane in Visual Studio, navigate to the folder **Provision\_Tools**. Right-click the **tpm_device_provision** project and select **Set as Startup Project**.
122
123
123
-
4. Run the solution using either of the "Start" commands on the "Debug" menu. The output window displays the TPM simulator's **_Registration ID_** and the **_Endorsement Key_**, needed for device enrollment and registration. Copy these values for use later. You can close this window (with Registration Id and Endorsement Key), but leave the TPM simulator window running that you started in step #1.
124
+
4. Run the solution using either of the "Start" commands on the "Debug" menu. The output window displays the TPM simulator's **_Registration ID_** and the **_Endorsement Key_**, needed for device enrollment and registration. Copy these values for use later. You can close this window (with Registration ID and Endorsement Key), but leave the TPM simulator window running that you started in step #1.
124
125
125
126
- For a simulated X.509 device:
126
127
127
128
1. Using Visual Studio, open the solution generated in the *cmake* folder named `azure_iot_sdks.sln`, and build it using the "Build solution" command on the "Build" menu.
128
129
129
130
2. In the *Solution Explorer* pane in Visual Studio, navigate to the folder **Provision\_Tools**. Right-click the **dice\_device\_enrollment** project and select **Set as Startup Project**.
130
131
131
-
3. Run the solution using either of the "Start" commands on the "Debug" menu. In the output window, enter **i** for individual enrollment when prompted. The output window displays a locally generated X.509 certificate for your simulated device. Copy to clipboard the output starting from *-----BEGIN CERTIFICATE-----* and ending at the first *-----END CERTIFICATE-----*, making sure to include both of these lines as well. Note that you need only the first certificate from the output window.
132
+
3. Run the solution using either of the "Start" commands on the "Debug" menu. In the output window, enter **i** for individual enrollment when prompted. The output window displays a locally generated X.509 certificate for your simulated device. Copy to clipboard the output starting from *-----BEGIN CERTIFICATE-----* and ending at the first *-----END CERTIFICATE-----*, making sure to include both of these lines as well. You only need the first certificate from the output window.
132
133
133
134
4. Create a file named **_X509testcert.pem_**, open it in a text editor of your choice, and copy the clipboard contents to this file. Save the file as you will use it later for device enrollment. When your registration software runs, it uses the same certificate during auto-provisioning.
0 commit comments