Skip to main content

Part 2: Configure Device Trust Manager

Now that the initial access is set up, the next step is to configure DigiCert® Device Trust Manager for secure device management. This section helps you create divisions, define authentication policies, and set up certificate profiles.

Objectives

  • Create divisions to organize devices by business needs.

  • Set up authentication policies to manage device access.

  • Configure certificate profiles and management policies for certificate issuance.

Before you begin

To start initial configuration of Device Trust Manager, complete the following steps:

Step 1: Create a division and configure Rendezvous zones

Divisions allow you to create subtenants within aDevice Trust Manager account. This allows you to manage devices according to criteria such as location, function, or business unit.

Note

Device Trust Manager Rendezvous provides distinct zones, called Device Rendezvous Zones (DRZs), that are located across the globe to reduce latency and improve response times based on device proximity. After creating a division, a primary and secondary zone for Rendezvous can be configured.

  1. Sign in to DigiCert® ONE as a Solution Administrator.

  2. In DigiCert ONE, in the Manager menu (grid at top right), select Device Trust.

  3. In the Device Trust Manager menu, select Divisions.

  4. On the Divisions page, select Create new division.

  5. Enter a Name and, optionally, a description.

  6. Select Create new division to save.

  7. On the Divisions page, select the created division to view its details.

  8. On the Division details page, expand the Rendezvous zones assigned to division section.

  9. On the Primary zone tab, choose a Rendezvous zone from the dropdown and select Add zone.

  10. (Optional) On the Secondary zone tab, select a backup Rendezvous zone and select Add zone.

Step 2: Create an authentication policy

Authentication policies support multiple credentials, including passcodes, authentication certificates, and authentication CAs.

Tip

A single authentication policy can be assigned to multiple device groups and certificate management policies.

  1. In the Device Trust Manager menu, select Authentication management > Authentication policies.

  2. Select Create authentication policy.

  3. Enter a Name and, optionally, a description.

  4. Select Create new authentication policy to save.

Step 3: Add a passcode to an authentication policy

Passcodes are one of the methods that can be used for device authentication and certificate requests using protocols such as SCEP, EST, and CMPv2.

  1. In the Device Trust Manager menu, select Authentication management > Authentication policies.

  2. Select Create passcode.

  3. Enter a Name and, optionally, a description.

  4. Under Assign or create an authentication policy, choose the policy created in Step 2: Create an authentication policy.

  5. If necessary, configure additional passcode settings, such as usage restrictions.

  6. Select Create passcode to save.

Important

When using a passcode for API authentication, make sure to set the header to x-passcode instead of x-api-key.

Step 4: Create a certificate profile

Certificate profiles define essential settings for certificate issuance. You can set default values for subject distinguished names, customize the certificate validity period, and enable or disable specific extensions as needed.

  1. In the Device Trust Manager menu, select Certificate management > Certificate profiles.

  2. Select Create certificate profile.

  3. Enter a Name for the certificate profile.

  4. Use DigiCert ONE as the CA source or choose one from the list.

  5. Under Template, select either End entity or Intermediate CA, depending on your requirement.

  6. Choose a certificate template that the certificate profile will use. Configurable custom field options are loaded based on the template you choose.

    Note

    If no certificate templates are available, contact your DigiCert account representative to request a custom template tailored to your needs.

  7. Select if All divisions can use the certificate profile or only Specific divisions.

  8. Configure custom field options as required. For example, default values or renewal settings.

  9. Enable at least one subject attribute from the available list or mark the SAN extension in the template as critical.

    The available list of subject attributes includes Common name, Organization name, Organization unit, and address fields.

  10. Select Create to save the certificate profile.

Step 5: Create a certificate management policy

A certificate management policy defines how certificates, including bootstrap certificates and operational certificates, are issued, renewed, and revoked for devices.

Devices must use a bootstrap certificate to authenticate with the Rendezvous service. The bootstrap certificate allows the devices to request short-lived X.509 operational certificates.

While bootstrap and operational certificates are typically obtained through the certificate management method, other approved methods and protocols are also used for certificate issuance and management. For details, see Certificate management policies.

Create a certificate management policy for bootstrap certificates

Before you begin

To complete these steps, ensure you:

  1. Sign in to DigiCert® ONE as a Solution Administrator.

  2. In DigiCert ONE, in the Manager menu (grid at top right), select Device Trust.

  3. In the Device Trust Manager menu, select Certificate management > Certificate management policies.

  4. Select Create certificate management policy.

  5. On the General certificate management policy settings page:

    1. Enter a Name for the bootstrap certificate policy.

    2. Select the Division you created.

    3. Select the required certificate management model.

    4. Select Single certificate request through portal and REST API and register a single device under Certificate management methods.

    5. Select an Authentication policy from the dropdown menu (optional).

      You can use the credentials defined in an authentication policy to authenticate API requests. When you assign a certificate management policy to a device group, you can also link it to an authentication policy. For devices in that group, the authentication policy set at the device group level always overrides the one associated with the certificate management policy.

  6. Click Next.

  7. On the Certificate settings page:

    1. Select either an End entity certificate profile or an intermediate certificate profile from the dropdown menu.

    2. Select an Issuing CA from the dropdown menu.

    3. Select Server-side keypair generation from the Keypair generation settings section.

      DigiCert​​®​​ generates keypair for certificate issuance. When selecting this option, specify the default key type and size, such as RSA 2048 or P-256.

    4. (Optional) if required, select the Allow the request to select the key and key size at the time of their certificate request checkbox.

    5. (Optional) if required, select the Allow the requestor to select local or server-side keypair generation at the time of their certificate request checkbox.

  8. Click Next.

  9. On the Certificate management method settings page:

    1. Expand the Single certificate request through portal and API section.

      Note

      Your selected certificate management methods must align with the settings in the certificate profiles. If there are no certificate profiles that support the selected protocols, you will not be able to create a certificate management policy.

    2. Follow the on-screen instructions and select the required fields.

  10. Click Finish to create a certificate management policy for bootstrap certificates.

Create a certificate management policy for operational certificates

Before you begin

To complete these steps, ensure you:

  1. Sign in to DigiCert® ONE as a Solution Administrator.

  2. In DigiCert ONE, in the Manager menu (grid at top right), select Device Trust.

  3. In the Device Trust Manager menu, select Certificate management > Certificate management policies.

  4. Select Create certificate management policy.

  5. On the General certificate management policy settings page:

    1. Enter a Name for the operational certificate policy.

    2. Select the Division you created.

    3. Select Policy will be used for secure device lifecycle management. Requires an Advanced license from the Select the certificate management model section.

    4. Select DigiCert TrustEdge agent under Certificate management methods.

    5. Select an Authentication policy from the dropdown menu (optional).

  6. Click Next.

  7. On the Certificate settings page:

    1. Select either an End entity certificate profile or an intermediate certificate profile from the dropdown menu.

    2. Select an Issuing CA from the dropdown menu.

    3. Select Local keypair generation from the Keypair generation settings section.

      The requestor generates the keypair locally and includes the public key in their Certificate Signing Request (CSR). This is recommended for TrustEdge management-based operational certificates.

  8. Click Next.

  9. On the Certificate management method settings page:

    1. Expand the Manage certificates using the DigiCert TrustEdge Agent section.

    2. Select the required Certificate request format from the dropdown menu.

    3. (Optional) Request a format specification from the dropdown menu.

    4. (Optional) Specify a Certificate private key alias in the text box.

      An alias is a unique identifier for a key on a device, used to distinguish between multiple keys and ensure the correct one is used for specific operations.

    5. (Optional) Select an appropriate Key algorithm from the dropdown list.

    6. From the Define how the agent will generate certificate values, select either any expression (Use an expresssion evaluated by the TrustEdge agent to provide a certificate value) or provide a default certificate value.

      Note

      What are these used for? These selected attributes are used to create an identity attribute for a device. This identity attribute of the device must be unique across your fleet to ensure reliable device identification and management. See Attributes to learn more.

    7. Select Client-side software from the Private key generation dropdown menu.

  10. Click Finish to create a certificate management policy for operational certificates.

Review your progress

At this stage, Device Trust Manager is configured with divisions, authentication policies, and certificate management policies (bootstrap and operational certificates). You should now have:

  • A division created to organize devices and other entities

  • Authentication policies and passcodes are set up for secure access

  • Certificate profiles and management policies are defined for controlled certificate issuance

What’s next?

Continue to Part 3: Set up device management to configure your device management structure.