Редагувати

Поділитися через


SSL/TLS certificate requirements for on-premises resources

This article is one in a series of articles describing the deployment path for OT monitoring with Microsoft Defender for IoT.

Use the content below to learn about the requirements for creating SSL/TLS certificates for use with Microsoft Defender for IoT appliances.

Diagram of a progress bar with Plan and prepare highlighted.

Defender for IoT uses SSL/TLS certificates to secure communication between the following system components:

  • Between users and the OT sensor or on-premises management console UI access
  • Between OT sensors and an on-premises management console, including API communication
  • Between an on-premises management console and a high availability (HA) server, if configured
  • Between OT sensors or on-premises management consoles and partners servers defined in alert forwarding rules

Some organizations also validate their certificates against a Certificate Revocation List (CRL) and the certificate expiration date, and the certificate trust chain. Invalid certificates can't be uploaded to OT sensors or on-premises management consoles, and will block encrypted communication between Defender for IoT components.

Important

You must create a unique certificate for each OT sensor, on-premises management console, and high availability server, where each certificate meets required criteria.

Supported file types

When preparing SSL/TLS certificates for use with Microsoft Defender for IoT, make sure to create the following file types:

File type Description
.crt – certificate container file A .pem, or .der file, with a different extension for support in Windows Explorer.
.key – Private key file A key file is in the same format as a .pem file, with a different extension for support in Windows Explorer.
.pem – certificate container file (optional) Optional. A text file with a Base64-encoding of the certificate text, and a plain-text header and footer to mark the beginning and end of the certificate.

CRT file requirements

Make sure that your certificates include the following CRT parameter details:

Field Requirement
Signature Algorithm SHA256RSA
Signature Hash Algorithm SHA256
Valid from A valid past date
Valid To A valid future date
Public Key RSA 2048 bits (Minimum) or 4096 bits
CRL Distribution Point URL to a CRL server. If your organization doesn't validate certificates against a CRL server, remove this line from the certificate.
Subject CN (Common Name) domain name of the appliance, such as sensor.contoso.com, or .contosocom
Subject (C)ountry Certificate country code, such as US
Subject (OU) Org Unit The organization's unit name, such as Contoso Labs
Subject (O)rganization The organization's name, such as Contoso Inc.

Important

While certificates with other parameters might work, they aren't supported by Defender for IoT. Additionally, wildcard SSL certificates, which are public key certificates that can beused on multiple subdomains such as .contoso.com, are insecure and aren't supported. Each appliance must use a unique CN.

Key file requirements

Make sure that your certificate key files use either RSA 2048 bits or 4096 bits. Using a key length of 4096 bits slows down the SSL handshake at the start of each connection, and increases the CPU usage during handshakes.

Supported characters for keys and passphrases

The following characters are supported for creating a key or certificate with a passphrase:

  • ASCII characters, including a-z, A-Z, 0-9
  • The following special characters: ! # % ( ) + , - . / : = ? @ [ \ ] ^ _ { } ~

Next steps