Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
This article shows you how to run certificate lifecycle operations for Azure Device Registry in Azure IoT Hub:
- Revoke certificates at the device level.
- Revoke certificates at the policy level.
- Delete a policy.
- Delete a credential resource.
Use these procedures when you need to respond to a security event, retire certificate resources, or clean up certificate paths in production.
Important
Azure IoT Hub with ADR integration and Microsoft-backed X.509 certificate management is in public preview and isn't recommended for production workloads. For more information, see the FAQ: What is new in IoT Hub?
Prerequisites
Before you begin, make sure you have:
- An active Azure subscription. If you don't have one, create a free account.
- An existing production deployment with IoT Hub Gen2 linked to a Device Registry namespace. For setup steps, see Deploy Azure IoT Hub with ADR integration and certificate management.
- A configured credential and policy in the Device Registry namespace. For setup steps, see Configure a Root CA credential in Azure Device Registry.
- Device Provisioning Service (DPS) configured for devices that use operational certificate issuance and rotation.
- The Azure Device Registry Credentials Contributor role on the Device Registry namespace.
Revoke certificates for a device
Use these steps to rotate one device certificate when you need to isolate risk to a single device.
- Sign in to the Azure portal.
- Open your Azure Device Registry namespace.
- Under Namespace resources on the sidebar menu, select Devices.
- Select the target device.
- Select Revoke device certificates.
- (Optional) Select Also disable device after revoking if you need to block device authentication.
- Confirm the operation.
Revoke certificates for a policy
Use these steps to rotate a policy issuer when you need to invalidate certificates issued by that policy.
- Open your Azure Device Registry namespace.
- Under Namespace resources on the sidebar menu, select Credential Policies.
- Select the target policy.
- Select Revoke certificates, and confirm the operation.
For a standard policy that uses your namespace's root CA, Azure Device Registry rotates the issuing CA and syncs the replacement CA to linked hubs.
For a policy that uses an external root, you cannot revoke the policy on Azure Device Registry as the CRL is also external. You must ensure that the revocation also propagates to that external CA's certificate revocation list (CRL) or OCSP responder. We require that you revoke all of your leaf certificates and then delete your policy.
Delete a policy
Use these steps to remove a policy when you no longer need it for certificate issuance.
- Open your Azure Device Registry namespace.
- Under Namespace resources on the sidebar menu, select Credential policies.
- Select the target policy.
- Select Delete policy, and confirm the operation.
Delete a credential resource
Use these steps to remove a credential resource when you need to retire that certificate path.
- Open Credential policies in your Device Registry namespace.
- Select the credential resource.
- Select Delete, and confirm the delete operation.