Skip to content

Latest commit

 

History

History
70 lines (43 loc) · 2.03 KB

DeviceCredentials.rst

File metadata and controls

70 lines (43 loc) · 2.03 KB

Create device credentials

For creating device credentials, you must generate the following certificates:

  • CA root certificate
  • CA intermediate certificate
  • Device certificate

Generate a CA root certificate

Note

Make sure that you have exported the right resource group name as $RESOURCE_GROUP. By default, it is set to nrfassettracker.

To create a CA root certificate and register it with the Azure IoT Device Provisioning Service, run the following command:

./cli.sh create-ca-root

Note

The default lifetime for root CA certificates is 1 year. Run ./cli.sh create-ca-root --help to learn how to customize the lifetime.

Do not share the CA root certificate. The number of CA root certificates is typically very small, and the minimum number of certificates required is one.

Provide the proof of your ownership of the CA with the following command:

./cli.sh proof-ca-root-possession

Note

If you see the error A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file., confirm that your system clock is accurate.

Generate a CA intermediate certificate

To create a CA intermediate certificate and an enrollment group for it, run the following command:

./cli.sh create-ca-intermediate

Note

The default lifetime for intermediate CA certificates is 1 year. Run ./cli.sh create-ca-intermediate --help to learn how to customize the lifetime.

You can share the CA intermediate certificate with the factory. You will have multiple intermediate certificates over time.

Generate and provision the device certificate