You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-operations/discover-manage-assets/howto-configure-opc-ua.md
+8-6Lines changed: 8 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,6 +40,10 @@ Your IT administrator must configure the OPC UA connector template for your Azur
40
40
41
41
An OPC UA server that you can reach from your Azure IoT Operations cluster. If you don't have an OPC UA server, use the OPC PLC simulator from the Azure IoT Operations samples repository.
42
42
43
+
## Configure a certificate trust list for the connector
An Azure IoT Operations deployment can include a sample OPC PLC simulator. To create a device that uses the OPC PLC simulator:
@@ -152,8 +156,6 @@ To use the `UsernamePassword` authentication mode, complete the following steps:
152
156
153
157
### Other security options
154
158
155
-
To manage the trusted certificates list for the connector for OPC UA, see [Manage certificates for external communications](../secure-iot-ops/howto-manage-certificates.md#manage-certificates-for-external-communications).
156
-
157
159
When you create the inbound endpoint, you can also select:
158
160
159
161
| Option | Type | Description |
@@ -384,7 +386,7 @@ Now you can define the events associated with the asset. To add OPC UA events in
384
386
385
387
### Event filters
386
388
387
-
Define event filters to customize the information that's included in event notifications from the server. By default, the server sends a selection of standard fields in event notifications. The server determines the exact selection for each event type. For example:
389
+
Define event filters to customize the information included in event notifications from the server. By default, the server sends a selection of standard fields in event notifications. The server determines the exact selection for each event type. For example:
388
390
389
391
```json
390
392
{
@@ -401,7 +403,7 @@ Define event filters to customize the information that's included in event notif
401
403
402
404
Use an event filter to:
403
405
404
-
- Include additional fields in event notifications.
406
+
- Include extra fields in event notifications.
405
407
- Exclude fields from event notifications.
406
408
- Modify field names in event notifications.
407
409
@@ -424,7 +426,7 @@ The three properties for a filter row are:
424
426
-_Type definition ID_. Optional value that specifies the OPC UA type definition of the source field.
425
427
-_Field ID_. Optional value that specifies the name to use for the field in the forwarded event notification. If you don't specify a field ID, the original field name is used.
426
428
427
-
The resulting message forwarded by the connector now looks like the following:
429
+
The resulting message forwarded by the connector now looks like the following example:
To configure the connector for HTTP/REST, first create a device that defines the connection to the HTTP source. The device includes the URL of the HTTP source and any credentials you need to access the HTTP source:
@@ -160,11 +164,7 @@ To use the `Username password` authentication mode, complete the following steps
160
164
161
165
### Configure a device to use an X.509 certificate
### Configure a certificate trust list for a device to use
166
-
167
-
To manage the trusted certificates list for the connector for HTTP/REST, see [Manage certificates for external communications](../secure-iot-ops/howto-manage-certificates.md#manage-certificates-for-external-communications).
To configure the media connector, first create a device that defines the connection to the media source. The device includes the URL of the media source and any credentials you need to access the media source:
@@ -190,10 +206,6 @@ To use the `Username password` authentication mode, complete the following steps
190
206
191
207
---
192
208
193
-
### Configure a certificate trust list for a device to use
194
-
195
-
To manage the trusted certificates list for the media connector, see [Manage certificates for external communications](../secure-iot-ops/howto-manage-certificates.md#manage-certificates-for-external-communications).
196
-
197
209
## Create an asset to publish an image snapshot
198
210
199
211
To define an asset that publishes an image snapshot from the media source to the MQTT broker:
@@ -300,7 +312,7 @@ The following steps show you how to run the **mosquitto_sub** tool in the cluste
Copy file name to clipboardExpand all lines: articles/iot-operations/discover-manage-assets/howto-use-mqtt-connector.md
+23-14Lines changed: 23 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,20 +12,29 @@ ms.date: 10/21/2025
12
12
13
13
# Configure the connector for MQTT (preview)
14
14
15
-
This is a preview version of the connector for MQTT connector that lets you model external MQTT endpoints as assets in Azure IoT Operations. The MQTT connector can detect new topic paths as they appear, you can view the custom resources that represent the detected topics.
15
+
This preview version of the connector for MQTT connector lets you model external MQTT endpoints as assets in Azure IoT Operations. The MQTT connector can detect new topic paths as they appear, you can view the custom resources that represent the detected topics.
The connector for MQTT (preview) supports the following features:
21
+
The following table summarizes the features the connector for MQTT (preview) supports:
22
22
23
-
- Enables topics from MQTT device to be represented as assets in Azure Device Registry (ADR).
24
-
- Establishes communication with MQTT broker for northbound and southbound connections.
25
-
- Detects new topics that appear under a given topic path and communicates with Akri. Akri creates the _detected asset_ custom resource ready for OT approval and import into ADR.
26
-
- Detects new topics that appear under a given MQTT wildcard path and communicates with Akri. Akri creates the _detected asset_ custom resource ready for OT approval and import into ADR.
27
-
- For approved or imported assets, the connector copies data from raw paths to user-assigned unified namespace paths.
28
-
- Follows MQTTS practices for secure communications with the Azure IoT Operations MQTT broker.
Your IT administrator must have configured the connector for MQTT template for your Azure IoT Operations instance in the Azure portal.
50
+
Your IT administrator must configure the connector for MQTT template for your Azure IoT Operations instance in the Azure portal.
42
51
43
52
You need any credentials required to access the MQTT source. If the MQTT source requires authentication, you need to create a Kubernetes secret that contains the username and password for the MQTT source.
To configure the connector for MQTT, first create a device that defines the connection to the MQTT topic to subscribe from. The device includes the address of the MQTT topic and any credentials you need to access it:
@@ -88,10 +101,6 @@ To use the `Username password` authentication mode:
### Configure a certificate trust list for a device to use
92
-
93
-
To manage the trusted certificates list for the connector for MQTT, see [Manage certificates for external communications](../secure-iot-ops/howto-manage-certificates.md#manage-certificates-for-external-communications).
94
-
95
104
## Discover and create assets
96
105
97
106
When you send a message to a topic that matches the topic filter you specified when creating the device, the connector for MQTT detects the new topic and creates a _detected asset_ custom resource. For example, if you specified the topic filter as `A/B/+`, and you send a message to the topic `A/B/asset1`, the connector for MQTT detects the new topic and creates a _detected asset_ that you can view in the operations experience web UI:
@@ -112,7 +121,7 @@ To create an asset from the detected asset, follow these steps:
112
121
:::image type="content" source="media/howto-use-mqtt-connector/detected-asset-dataset.png" alt-text="Screenshot that shows the dataset created from the detected asset." lightbox="media/howto-use-mqtt-connector/detected-asset-dataset.png":::
113
122
114
123
> [!TIP]
115
-
> You can add more datasets if required to capture messages from other topics.
124
+
> You can add more datasets if necessary to capture messages from other topics.
Copy file name to clipboardExpand all lines: articles/iot-operations/discover-manage-assets/howto-use-onvif-connector.md
+20-9Lines changed: 20 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,12 +12,27 @@ ms.date: 12/11/2025
12
12
13
13
# Configure the connector for ONVIF
14
14
15
-
In Azure IoT Operations, the connector for ONVIF enables you to discover and use an [ONVIF conformant](https://www.onvif.org/profiles-add-ons-specifications/) camera that's connected to your Azure IoT Operations cluster.
15
+
In Azure IoT Operations, the connector for ONVIF enables you to discover and use an [ONVIF conformant](https://www.onvif.org/profiles-add-ons-specifications/) camera connected to your Azure IoT Operations cluster.
The following table summarizes the features the connector for ONVIF supports:
22
+
23
+
| Feature | Supported | Notes |
24
+
|---------|:---------:|-------|
25
+
| Username/password authentication | Yes ||
26
+
| X.509 client certificates | No ||
27
+
| Anonymous access | Yes | For testing purposes |
28
+
| Certificate trust list | Yes | For secure TLS connections to ONVIF cameras |
29
+
| OpenTelemetry integration | Yes ||
30
+
| Device discovery | Yes | Discovers ONVIF cameras on the network |
31
+
| Capability discovery | Yes | Discovers PTZ and other device capabilities |
32
+
| Media endpoint discovery | Yes | Discovers media streams, framerate, resolution, encoding |
33
+
| Camera configuration | Yes | Retrieve and update camera settings |
34
+
| PTZ control | Yes | Control pan, tilt, and zoom |
35
+
21
36
The connector connects ONVIF cameras to your Azure IoT Operations instance and registers them in the Azure Device Registry. The connector then automatically discovers:
22
37
23
38
- The capabilities, such as pan-tilt-zoom (PTZ), of the ONVIF device.
@@ -45,12 +60,6 @@ This article describes how to use the operations experience web UI and Azure CLI
45
60
- Create a device that represents the media endpoints exposed by the ONVIF camera.
46
61
- Create an asset that captures snapshots from the media endpoint and publishes them to the MQTT broker.
47
62
48
-
The connector for ONVIF supports the following authentication methods:
49
-
- Username/password authentication
50
-
- Anonymous access for testing purposes
51
-
52
-
To establish a TLS connection to the ONVIF camera, you can configure a certificate trust list for the connector.
To add a device that includes an ONVIF endpoint for a compliant camera:
@@ -172,8 +185,6 @@ To use the `Username password` authentication mode, complete the following steps
172
185
173
186
### Other security options
174
187
175
-
To manage the trusted certificates list for the connector for ONVIF, see [Manage certificates for external communications](../secure-iot-ops/howto-manage-certificates.md#manage-certificates-for-external-communications).
176
-
177
188
When you create the inbound endpoint in the operations experience, you can also select the following options on the **Advanced** tab:
0 commit comments