Edit

Configure a credential in Azure Device Registry (preview)

When you enable Microsoft-backed X.509 certificate management in your Azure Device Registry (ADR) namespace, you create a single credential resource within that ADR namespace. A credential manages one unique root CA within your own cloud PKI.

Important

Azure IoT Hub with ADR integration and Microsoft-backed X.509 certificate management is in public preview and isn't recommended for production workloads. For more information, see the FAQ: What is new in IoT Hub?

Microsoft manages the PKI and root CA for your ADR namespace, so you don't need on-premises PKI infrastructure.

When you configure a credential, Microsoft:

  • Generates and stores the root certificate in Azure Key Vault Managed HSM
  • Manages the root certificate lifecycle
  • Lets you create issuing CAs (policies) that the root CA signs

You can configure a root CA credential in your ADR namespace by using the Azure portal or Azure CLI.

Prerequisites

  • An active Azure subscription. If you don't have an Azure subscription, create a free account.
  • An existing Azure Device Registry namespace. For setup instructions, see Deploy Azure IoT Hub with ADR integration and certificate management.
  • Ensure that you have the privilege to perform role assignments within your target ADR namespace scope. Performing role assignments in Azure requires a privileged role, such as Owner or User Access Administrator at the appropriate scope.

Configure a credential

Follow these steps to configure your root CA credential.

  1. Sign in to the Azure portal.

  2. Search for and select Azure Device Registry from the search bar.

  3. In the resource menu, select Namespaces, and then select your ADR namespace from the list.

  4. In the resource menu of your ADR namespace, select Credential policies (Preview) under Namespace resources.

  5. On the Credential policies (Preview) page, select Enable from the Enable certificate management dialog.

    Screenshot of the Certificate management page for an Azure Device Registry namespace in the Azure portal, highlighting the Enable button in the Enable certificate management dialog.

  6. Azure provisions a root CA credential for your namespace. This process takes a few moments to complete.

  7. After provisioning is complete, your root CA credential is ready to use. The credential is displayed on the Credential policies (Preview) page.

You can now create issuing CAs (policies) with either a Microsoft-issued certificate or an external CA within your namespace that is signed by your unique credential. To issue and manage X.509 certificates for your IoT devices, use these policies with Device Provisioning Service.

Next steps

After you configure your root CA credential, you can:

For more information about certificate management and the complete workflow, see: