Edit

Create or edit a policy with a Microsoft root CA (preview)

This article explains how to create or edit a policy within your Azure Device Registry (ADR) namespace to manage an issuing CA signed by your namespace's unique root CA.

Use this workflow if you want ADR to provide a fully managed public key infrastructure (PKI) for your namespace. When a device requests a certificate, the platform returns a full certificate chain consisting of:

  • The device certificate: Unique to the specific IoT device.

  • The issuing CA (ICA): The CA managed by ADR that signs the device request.

  • The namespace root CA: The unique, namespace-level root managed by the credential resource.

Your device identities are cryptographically scoped to their namespace, providing high tenant isolation and a simplified management experience without the need for an external private PKI.

Important

Azure IoT Hub with ADR integration and Microsoft-backed X.509 certificate management is in public preview and isn't recommended for production workloads. For more information, see the FAQ: What is new in IoT Hub?

In certificate management, a credential manages the namespace-level root CA, and a policy manages the issuing CA that signs device certificates.

Prerequisites

Before you begin, make sure you have:

Create a policy

You can create a policy by using the Azure portal or the Azure CLI. In this preview workflow, use the Azure portal when you need to change the validity period for an existing policy.

Create a policy by using the Azure portal

  1. Sign in to the Azure portal.

  2. Open your Azure Device Registry namespace.

  3. In the sidebar menu, under Namespace resources, select Credential policies.

  4. Select Create Policy.

    Screenshot showing the Credential policies pane.

  5. In the Basics tab, complete the fields as follows:

    Property Value
    Name Enter a unique name for your policy. The name must be between 3 and 50 alphanumeric characters and can include hyphens ('-').
    Validity period (days) Enter the number of days the issued certificates are valid.
    Select a Root CA for certificates in this policy Accept the default value, Use this namespace's Microsoft-issued Root CA (Default).

    Screenshot showing the Create polcy dialog.

  6. Select Next, then Review + create.

  7. Refresh the Policies list if needed, and verify that the new policy appears.

Edit a policy

Edit an existing policy to update its validity period when security or operational requirements change.

  1. In the sidebar menu of your ADR namespace, under Namespace resources, select Credential policies.

  2. Select the policy that you want to edit.

  3. On the Overview page, select edit next to Validity period.

  4. Change the Validity period value.

  5. Select Save.

  6. Refresh the page to verify that the updated validity period appears.

Synchronize the credential

Synchronize your new or updated policy.

  1. In the sidebar menu of your ADR namespace, under Namespace resources, select Credential policies.

  2. Select Sync all, and then Yes.

    Screenshot showing the Sync all button.