Skip to content

Commit ef85e33

Browse files
authored
Merge pull request #311990 from jlian/fix/baltimore-root-ca-stale
Update stale Baltimore CyberTrust Root references to DigiCert Global Root G2
2 parents 07351d4 + 4ee5c59 commit ef85e33

5 files changed

Lines changed: 8 additions & 14 deletions

File tree

articles/iot-edge/iot-edge-certs.md

Lines changed: 7 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -84,25 +84,19 @@ In our scenario, *ContosoIotHub* shows the following certificate chain:
8484

8585
<!-- mermaid
8686
flowchart TB
87-
id3["📃 CN = Baltimore CyberTrust Root (Root CA)"]
88-
id2["📃 CN = Microsoft IT TLS CA 1 (Intermediate CA)"]
87+
id3["📃 CN = DigiCert Global Root G2 (Root CA)"]
88+
id2["📃 CN = Microsoft Azure RSA TLS Issuing CA 08 (Intermediate CA)"]
8989
id1["📃 CN = *.azure-devices.net"]
9090
9191
id2-- Issued by -- -> id3
9292
id1-- Issued by -- -> id2
9393
-->
9494

95-
The root certificate authority (CA) is the [Baltimore CyberTrust Root](https://www.digicert.com/kb/digicert-root-certificates.htm) certificate. DigiCert signs this root certificate, and it's widely trusted and stored in many operating systems. For example, both Ubuntu and Windows include it in the default certificate store.
95+
The root certificate authority (CA) is the [DigiCert Global Root G2](https://www.digicert.com/kb/digicert-root-certificates.htm) certificate. DigiCert signs this root certificate, and it's widely trusted and stored in many operating systems. For example, Ubuntu includes it in the default certificate store:
9696

97-
Windows certificate store:
97+
:::image type="content" source="./media/iot-edge-certs/ubuntu-digicert.png" alt-text="Screenshot showing DigiCert Global Root G2 certificate listed in the Ubuntu certificate store." lightbox="./media/iot-edge-certs/ubuntu-digicert.png":::
9898

99-
:::image type="content" source="./media/iot-edge-certs/baltimore-windows.png" alt-text="Screenshot showing Baltimore CyberTrust Root certificate listed in the Windows certificate store." lightbox="./media/iot-edge-certs/baltimore-windows.png":::
100-
101-
Ubuntu certificate store:
102-
103-
:::image type="content" source="./media/iot-edge-certs/ubuntu-baltimore.png" alt-text="Screenshot showing Baltimore CyberTrust Root certificate listed in the Ubuntu certificate store." lightbox="./media/iot-edge-certs/ubuntu-baltimore.png":::
104-
105-
When a device checks for the *Baltimore CyberTrust Root* certificate, it's already in the OS. From the *EdgeGateway* perspective, since the certificate chain from *ContosoIotHub* is signed by a root CA the OS trusts, the certificate is trustworthy. This certificate is called the **IoT Hub server certificate**. For more about the IoT Hub server certificate, see [Transport Layer Security (TLS) support in IoT Hub](../iot-hub/iot-hub-tls-support.md).
99+
When a device checks for the *DigiCert Global Root G2* certificate, it's already in the OS. From the *EdgeGateway* perspective, since the certificate chain from *ContosoIotHub* is signed by a root CA the OS trusts, the certificate is trustworthy. This certificate is called the **IoT Hub server certificate**. For more about the IoT Hub server certificate, see [Transport Layer Security (TLS) support in IoT Hub](../iot-hub/iot-hub-tls-support.md).
106100

107101
In summary, *EdgeGateway* can verify and trust *ContosoIotHub's* identity because:
108102

@@ -248,7 +242,7 @@ To solve the issue, IoT Edge uses the configured hostname value in `config.toml`
248242

249243
#### Why does IoT Edge create certificates?
250244

251-
In the example, notice there's an *iotedged workload ca edgegateway* in the certificate chain. It's the certificate authority (CA) that exists on the IoT Edge device known as *Edge CA* (formerly known as *Device CA* in version 1.1). Like the *Baltimore CyberTrust root CA* in the earlier example, the *Edge CA* can issue other certificates. Most importantly, and also in this example, it issues the server certificate to *edgeHub* module. But, it can also issue certificates to other modules running on the IoT Edge device.
245+
In the example, notice there's an *iotedged workload ca edgegateway* in the certificate chain. It's the certificate authority (CA) that exists on the IoT Edge device known as *Edge CA* (formerly known as *Device CA* in version 1.1). Like the *DigiCert Global Root G2* in the earlier example, the *Edge CA* can issue other certificates. Most importantly, and also in this example, it issues the server certificate to *edgeHub* module. But, it can also issue certificates to other modules running on the IoT Edge device.
252246

253247
> [!IMPORTANT]
254248
> By default without configuration, *Edge CA* is automatically generated by IoT Edge module runtime when it starts for the first time, known as *quickstart Edge CA*, and then it issues a certificate to *edgeHub* module. This process speeds downstream device connection by allowing *edgeHub* to present a valid certificate that is signed. Without this feature, you'd have to get your CA to issue a certificate for *edgeHub* module. Using an automatically generated *quickstart Edge CA* isn't supported for use in production. For more information on quickstart Edge CA, see [Quickstart Edge CA](how-to-manage-device-certificates.md#quickstart-edge-ca).
@@ -376,7 +370,7 @@ A certificate authority (CA) issues digital certificates. The CA acts as a trust
376370

377371
### Root CA certificate
378372

379-
A root CA certificate is the root of trust for the process. In production, you usually buy this CA certificate from a trusted commercial certificate authority like Baltimore, Verisign, or DigiCert. If you control all devices connecting to your IoT Edge devices, you can use a corporate certificate authority. In both cases, the certificate chain from IoT Edge to IoT Hub uses the root CA certificate. Downstream IoT devices must trust the root certificate. Store the root CA certificate in the trusted root certificate authority store or provide the certificate details in your application code.
373+
A root CA certificate is the root of trust for the process. In production, you usually buy this CA certificate from a trusted commercial certificate authority like DigiCert. If you control all devices connecting to your IoT Edge devices, you can use a corporate certificate authority. In both cases, the certificate chain from IoT Edge to IoT Hub uses the root CA certificate. Downstream IoT devices must trust the root certificate. Store the root CA certificate in the trusted root certificate authority store or provide the certificate details in your application code.
380374

381375
### Intermediate certificates
382376

-81.4 KB
Binary file not shown.

0 commit comments

Comments
 (0)