You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Update stale Baltimore CyberTrust Root references to DigiCert Global Root G2
IoT Hub completed its TLS root CA migration from Baltimore CyberTrust Root
to DigiCert Global Root G2 in 2023. Update all references in the IoT Edge
certificates page to reflect the current root CA.
Also updates the intermediate CA name from 'Microsoft IT TLS CA 1' to
'Microsoft Azure RSA TLS Issuing CA 08' and removes outdated commercial CA
names (Baltimore, Verisign) from the root CA certificate section.
Copy file name to clipboardExpand all lines: articles/iot-edge/iot-edge-certs.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -84,25 +84,25 @@ In our scenario, *ContosoIotHub* shows the following certificate chain:
84
84
85
85
<!-- mermaid
86
86
flowchart TB
87
-
id3["📃 CN = Baltimore CyberTrust Root (Root CA)"]
88
-
id2["📃 CN = Microsoft IT TLS CA 1 (Intermediate CA)"]
87
+
id3["📃 CN = DigiCert Global Root G2 (Root CA)"]
88
+
id2["📃 CN = Microsoft Azure RSA TLS Issuing CA 08 (Intermediate CA)"]
89
89
id1["📃 CN = *.azure-devices.net"]
90
90
91
91
id2-- Issued by -- -> id3
92
92
id1-- Issued by -- -> id2
93
93
-->
94
94
95
-
The root certificate authority (CA) is the [Baltimore CyberTrust Root](https://www.digicert.com/kb/digicert-root-certificates.htm) certificate. DigiCert signs this root certificate, and it's widely trusted and stored in many operating systems. For example, both Ubuntu and Windows include it in the default certificate store.
95
+
The root certificate authority (CA) is the [DigiCert Global Root G2](https://www.digicert.com/kb/digicert-root-certificates.htm) certificate. DigiCert signs this root certificate, and it's widely trusted and stored in many operating systems. For example, both Ubuntu and Windows include it in the default certificate store.
96
96
97
97
Windows certificate store:
98
98
99
-
:::image type="content" source="./media/iot-edge-certs/baltimore-windows.png" alt-text="Screenshot showing Baltimore CyberTrust Root certificate listed in the Windows certificate store." lightbox="./media/iot-edge-certs/baltimore-windows.png":::
99
+
:::image type="content" source="./media/iot-edge-certs/baltimore-windows.png" alt-text="Screenshot showing DigiCert Global Root G2 certificate listed in the Windows certificate store." lightbox="./media/iot-edge-certs/baltimore-windows.png":::
100
100
101
101
Ubuntu certificate store:
102
102
103
-
:::image type="content" source="./media/iot-edge-certs/ubuntu-baltimore.png" alt-text="Screenshot showing Baltimore CyberTrust Root certificate listed in the Ubuntu certificate store." lightbox="./media/iot-edge-certs/ubuntu-baltimore.png":::
103
+
:::image type="content" source="./media/iot-edge-certs/ubuntu-baltimore.png" alt-text="Screenshot showing DigiCert Global Root G2 certificate listed in the Ubuntu certificate store." lightbox="./media/iot-edge-certs/ubuntu-baltimore.png":::
104
104
105
-
When a device checks for the *Baltimore CyberTrust Root* certificate, it's already in the OS. From the *EdgeGateway* perspective, since the certificate chain from *ContosoIotHub* is signed by a root CA the OS trusts, the certificate is trustworthy. This certificate is called the **IoT Hub server certificate**. For more about the IoT Hub server certificate, see [Transport Layer Security (TLS) support in IoT Hub](../iot-hub/iot-hub-tls-support.md).
105
+
When a device checks for the *DigiCert Global Root G2* certificate, it's already in the OS. From the *EdgeGateway* perspective, since the certificate chain from *ContosoIotHub* is signed by a root CA the OS trusts, the certificate is trustworthy. This certificate is called the **IoT Hub server certificate**. For more about the IoT Hub server certificate, see [Transport Layer Security (TLS) support in IoT Hub](../iot-hub/iot-hub-tls-support.md).
106
106
107
107
In summary, *EdgeGateway* can verify and trust *ContosoIotHub's* identity because:
108
108
@@ -248,7 +248,7 @@ To solve the issue, IoT Edge uses the configured hostname value in `config.toml`
248
248
249
249
#### Why does IoT Edge create certificates?
250
250
251
-
In the example, notice there's an *iotedged workload ca edgegateway* in the certificate chain. It's the certificate authority (CA) that exists on the IoT Edge device known as *Edge CA* (formerly known as *Device CA* in version 1.1). Like the *Baltimore CyberTrust root CA* in the earlier example, the *Edge CA* can issue other certificates. Most importantly, and also in this example, it issues the server certificate to *edgeHub* module. But, it can also issue certificates to other modules running on the IoT Edge device.
251
+
In the example, notice there's an *iotedged workload ca edgegateway* in the certificate chain. It's the certificate authority (CA) that exists on the IoT Edge device known as *Edge CA* (formerly known as *Device CA* in version 1.1). Like the *DigiCert Global Root G2* in the earlier example, the *Edge CA* can issue other certificates. Most importantly, and also in this example, it issues the server certificate to *edgeHub* module. But, it can also issue certificates to other modules running on the IoT Edge device.
252
252
253
253
> [!IMPORTANT]
254
254
> By default without configuration, *Edge CA* is automatically generated by IoT Edge module runtime when it starts for the first time, known as *quickstart Edge CA*, and then it issues a certificate to *edgeHub* module. This process speeds downstream device connection by allowing *edgeHub* to present a valid certificate that is signed. Without this feature, you'd have to get your CA to issue a certificate for *edgeHub* module. Using an automatically generated *quickstart Edge CA* isn't supported for use in production. For more information on quickstart Edge CA, see [Quickstart Edge CA](how-to-manage-device-certificates.md#quickstart-edge-ca).
@@ -376,7 +376,7 @@ A certificate authority (CA) issues digital certificates. The CA acts as a trust
376
376
377
377
### Root CA certificate
378
378
379
-
A root CA certificate is the root of trust for the process. In production, you usually buy this CA certificate from a trusted commercial certificate authority like Baltimore, Verisign, or DigiCert. If you control all devices connecting to your IoT Edge devices, you can use a corporate certificate authority. In both cases, the certificate chain from IoT Edge to IoT Hub uses the root CA certificate. Downstream IoT devices must trust the root certificate. Store the root CA certificate in the trusted root certificate authority store or provide the certificate details in your application code.
379
+
A root CA certificate is the root of trust for the process. In production, you usually buy this CA certificate from a trusted commercial certificate authority like DigiCert. If you control all devices connecting to your IoT Edge devices, you can use a corporate certificate authority. In both cases, the certificate chain from IoT Edge to IoT Hub uses the root CA certificate. Downstream IoT devices must trust the root certificate. Store the root CA certificate in the trusted root certificate authority store or provide the certificate details in your application code.
0 commit comments