You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This article shows how to autoprovision one or more [IoT Edge for Linux on Windows](iot-edge-for-linux-on-windows.md) devices using symmetric keys. You can automatically provision Azure IoT Edge devices with the [Azure IoT Hub device provisioning service](../iot-dps/index.yml) (DPS). If you're unfamiliar with the process of autoprovisioning, review the [provisioning overview](../iot-dps/about-iot-dps.md#provisioning-process) before continuing.
17
+
This article shows how to autoprovision one or more [IoT Edge for Linux on Windows](iot-edge-for-linux-on-windows.md) devices using symmetric keys. Automatically provision Azure IoT Edge devices with the [Azure IoT Hub device provisioning service](../iot-dps/index.yml) (DPS). If you're unfamiliar with the process of autoprovisioning, review the [provisioning overview](../iot-dps/about-iot-dps.md#provisioning-process) before continuing.
18
18
19
19
20
-
The tasks are as follows:
20
+
Here are the tasks:
21
21
22
22
1. Create either an **individual enrollment** for a single device or a **group enrollment** for a set of devices.
23
23
1. Deploy a Linux virtual machine with the IoT Edge runtime installed and connect it to the IoT Hub.
24
24
25
-
Symmetric key attestation is a simple approach to authenticating a device with a device provisioning service instance. This attestation method represents a "Hello world" experience for developers who are new to device provisioning, or do not have strict security requirements. Device attestation using a [TPM](../iot-dps/concepts-tpm-attestation.md) or [X.509 certificates](../iot-dps/concepts-x509-attestation.md) is more secure, and should be used for more stringent security requirements.
25
+
Symmetric key attestation is a simple way to authenticate a device with a device provisioning service instance. This attestation method is a "Hello world" experience for developers who are new to device provisioning or don't have strict security requirements. Device attestation using a [TPM](../iot-dps/concepts-tpm-attestation.md) or [X.509 certificates](../iot-dps/concepts-x509-attestation.md) is more secure, and you should use it for more stringent security requirements.
26
26
27
27
## Prerequisites
28
28
@@ -40,13 +40,13 @@ Symmetric key attestation is a simple approach to authenticating a device with a
40
40
41
41
## Provision the device with its cloud identity
42
42
43
-
Once the runtime is installed on your device, configure the device with the information it uses to connect to the device provisioning service and IoT Hub.
43
+
After you install the runtime on your device, configure the device with the information it uses to connect to the device provisioning service and IoT Hub.
44
44
45
-
Have the following information ready:
45
+
Make sure you have the following information:
46
46
47
47
* The DPS **ID Scope** value
48
48
* The device **Registration ID** you created
49
-
*Either the**Primary Key** from an individual enrollment, or a [derived key](#derive-a-device-key) for devices using a group enrollment.
49
+
*The**Primary Key** from an individual enrollment, or a [derived key](#derive-a-device-key) for devices using a group enrollment.
50
50
51
51
Run the following command in an elevated PowerShell session with the placeholder values updated with your own values:
You can verify that the individual enrollment that you created in device provisioning service was used. Navigate to your device provisioning service instance in the Azure portal. Open the enrollment details for the individual enrollment that you created. Notice that the status of the enrollment is **assigned** and the device ID is listed.
63
+
Check that the individual enrollment you created in device provisioning service is used. Go to your device provisioning service instance in the Azure portal. Open the enrollment details for the individual enrollment you created. The status of the enrollment is **assigned**, and the device ID is listed.
64
64
65
65
# [Group enrollment](#tab/group-enrollment)
66
66
67
-
You can verify that the group enrollment that you created in device provisioning service was used. Navigate to your device provisioning service instance in the Azure portal. Open the enrollment details for the group enrollment that you created. Go to the **Registration Records** tab to view all devices registered in that group.
67
+
Check that the group enrollment you created in device provisioning service is used. Go to your device provisioning service instance in the Azure portal. Open the enrollment details for the group enrollment you created. Go to the **Registration Records** tab to view all devices registered in that group.
68
68
69
69
---
70
70
@@ -77,7 +77,7 @@ You can verify that the group enrollment that you created in device provisioning
77
77
>[!NOTE]
78
78
>The only account allowed to SSH to the virtual machine is the user that created it.
79
79
80
-
1. Once you are logged in, you can check the list of running IoT Edge modules using the following Linux command:
80
+
1. Once you're logged in, you can check the list of running IoT Edge modules using the following Linux command:
81
81
82
82
```bash
83
83
sudo iotedge list
@@ -104,16 +104,16 @@ You can verify that the group enrollment that you created in device provisioning
104
104
>
105
105
>**Could not check current state of edgeHub container**
106
106
>
107
-
>This error is expected on a newly provisioned device because the IoT Edge Hub module isn't running. To resolve the error, in IoT Hub, set the modules for the device and create a deployment. Creating a deployment for the device starts the modules on the device including the IoT Edge Hub module.
107
+
>This error is expected on a newly provisioned device because the IoT Edge Hub module isn't running. To fix the error, in IoT Hub, set the modules for the device and create a deployment. Creating a deployment for the device starts the modules on the device, including the IoT Edge Hub module.
108
108
109
-
When you create a new IoT Edge device, it displays the status code `417 -- The device's deployment configuration is not set` in the Azure portal. This status is normal, and means that the device is ready to receive a module deployment.
109
+
When you create a new IoT Edge device, it shows the status code `417 -- The device's deployment configuration is not set` in the Azure portal. This status is normal and means the device is ready to receive a module deployment.
110
110
111
111
<!-- Uninstall IoT Edge for Linux on Windows H2 and content -->
The device provisioning service enrollment process lets you set the device ID and device twin tags at the same time as you provision the new device. You can use those values to target individual devices or groups of devices using automatic device management. Learn how to [Deploy and monitor IoT Edge modules at scale using the Azure portal](how-to-deploy-at-scale.md) or [using Azure CLI](how-to-deploy-cli-at-scale.md).
116
+
The device provisioning service enrollment process lets you set the device ID and device twin tags when you provision a new device. Use those values to target individual devices or groups of devices with automatic device management. Learn how to [deploy and monitor IoT Edge modules at scale using the Azure portal](how-to-deploy-at-scale.md) or [using Azure CLI](how-to-deploy-cli-at-scale.md).
0 commit comments