Skip to main content

Certificates

Device Trust Manager issues x.509 certificates to devices to establish secure communication and authenticate with the platform. During provisioning, a device receives a bootstrap certificate, which verifies the device's identity and initiates secure communication with Device Trust Manager. As the device continues to operate, it may request operational certificates for short-term, specific operations as needed throughout its lifecycle.

Table 1. Issued certificate use cases

Use case

Bootstrap certificate

Operational certificate


Certificate issuance and renewal

Device Trust Manager uses a range of protocols for certificate issuance and renewal, supporting both single and batch requests, as well as automatic renewals.

  • EST

  • SCEP

  • CMPv2

  • ACME

  • TrustEdge agent

To perform this action, you must have a user role that contains the Device administrator permission.

Issuing a single device certificate request will be associated with a device record.

Before you begin:

Ensure that your Solution Administrator has already completed the following:

  1. In the Device Trust Manager menu, go to Certificate management > Certificates.

  2. Select Request certificate > Request a certificate for a device.

  3. From the Device Group dropdown menu, select an appropriate device group.

  4. From the Certificate management policy dropdown menu, select the certificate management policy associated with the device group.

  5. On the Key generation type step:

    Note

    The Key generation type option is displayed based on your selection of the Device group and the Certificate management policy.

    1. I have the keypairs and will provide the CSRs or public keys in the request:

      • Upload a CSV file or a zipped CSV containing the device data. You can download the provided template for formatting guidance.

    2. Key pairs will be generated server side by this application, and the private key and certificate will be included in response:

      • Select the Key generation type dropdown menu.

  6. Provide a Common name for the certificate.

  7. Optionally, provide an Organization name.

  8. Click Add Value to provide an organization unit value (optional).

  9. Provide a Description (optional).

  10. Click Submit certificate request.

  11. Download the certificate after successful submission of the certificate request.

To perform this action, you must have a user role that contains the Device administrator permission.

Issuing a single certificate request will not be associated with a device record.

Before you begin:

  1. In the Device Trust Manager menu, go to Certificate management > Certificates.

  2. Select Request certificate > Request a certificate.

  3. From the Certificate management policy dropdown menu, select an appropriate policy.

  4. On the Key generation type step:

    Note

    The Key generation type option is displayed based on your selection of the Certificate management policy.

    1. I have the keypairs and will provide the CSRs or public keys in the request:

      • Upload a CSV file or a zipped CSV containing the device data. You can download the provided template for formatting guidance.

    2. Key pairs will be generated server side by this application, and the private key and certificate will be included in response:

      • Select the Key generation type dropdown menu.

  5. Provide a Common name for the certificate.

  6. Optionally, provide an Organization name.

  7. Click Add Value to provide an organization unit value (optional).

  8. Provide a Description (optional).

  9. Click Submit certificate request.

  10. Download the certificate after successful submission of the certificate request.