<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>API registration of certification for Azure IoT Hub / DPS</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/106640/api-registration-of-certification-for-azure-iot-hub-dps</link><description>I am trying to connect a custom device to the Azure IoT Hub using DPS service. Because I am using a custom board I am trying to write certificates to the modem using api calls to the modem_key_mgmg functions. Theses functions have a tag and a credential</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Thu, 21 Dec 2023 12:18:31 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/106640/api-registration-of-certification-for-azure-iot-hub-dps" /><item><title>RE: API registration of certification for Azure IoT Hub / DPS</title><link>https://devzone.nordicsemi.com/thread/461433?ContentTypeID=1</link><pubDate>Thu, 21 Dec 2023 12:18:31 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:10f15b8a-eab0-458d-b89b-aa53b82ab241</guid><dc:creator>Thomas</dc:creator><description>&lt;p&gt;&lt;span style="font-size:inherit;"&gt;OK, I will try to replicate this using the http_sample. Yesterday I looked at the http_update sample and tried to move my certificate update code into main and just call the nrf_modem_lib_init()&amp;nbsp;before like in the sample. This did not solve the problem.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-size:inherit;"&gt;It must be some project configuration is my best quess.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-size:inherit;"&gt;Would it be possible that you&amp;nbsp; test the same with the azure iot_hub sample. It should now be possible to test for the problem just by reading out the keys witht the AT%CMNG= command.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: API registration of certification for Azure IoT Hub / DPS</title><link>https://devzone.nordicsemi.com/thread/461398?ContentTypeID=1</link><pubDate>Thu, 21 Dec 2023 09:51:36 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:1fefc431-41e2-49c4-bb3f-bd43a48e5252</guid><dc:creator>Charlie</dc:creator><description>&lt;p&gt;I tested with the official sample&amp;nbsp;&lt;span&gt;NCS\v2.5.0\nrf\samples\cellular\http_update sample to write&amp;nbsp;&lt;a href="https://devzone.nordicsemi.com/cfs-file/__key/communityserver-discussions-components-files/4/7633.DigiCertGlobalRootG2.zip"&gt;devzone.nordicsemi.com/.../7633.DigiCertGlobalRootG2.zip&lt;/a&gt;&amp;nbsp;from DigiCertGlobalRootG2.crt.pem to secure tag 42. You can see they have the same hash compared with the one I wrote with Certificate Manager on secure tag 11 on the previous test. Can you refer to&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;&lt;span&gt;cert_provision&lt;/span&gt;&lt;span&gt;(&lt;/span&gt;&lt;span&gt;void&lt;/span&gt;&lt;span&gt;) function to see the difference with your certificate writing function.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&amp;gt; AT+CFUN=4&lt;/p&gt;
&lt;p&gt;OK&lt;br /&gt;&amp;gt; AT%CMNG=&lt;/p&gt;
&lt;p&gt;...&lt;br /&gt;&lt;strong&gt;%CMNG: 11,0,&amp;quot;0E0A61E2E78D28EEA66B15A9B10C1F4E5E8AD379FEA9131D02EC4A2473F9AB9C&amp;quot;&lt;/strong&gt;&lt;br /&gt;...&lt;br /&gt;&lt;strong&gt;%CMNG: 42,0,&amp;quot;0E0A61E2E78D28EEA66B15A9B10C1F4E5E8AD379FEA9131D02EC4A2473F9AB9C&amp;quot;&lt;/strong&gt;&lt;br /&gt;...&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Charlie&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: API registration of certification for Azure IoT Hub / DPS</title><link>https://devzone.nordicsemi.com/thread/461304?ContentTypeID=1</link><pubDate>Wed, 20 Dec 2023 14:36:32 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:b19c83da-058c-4d2f-87d1-bddd3f830856</guid><dc:creator>Thomas</dc:creator><description>&lt;p&gt;When programming through the API i get the following output from AT%CMNG=1&lt;/p&gt;
&lt;p&gt;&lt;span style="font-size:75%;"&gt;%CMNG: 10,0,&amp;quot;5D550643B6400D4341550A9B14AEDD0B4FAC33AE5DEB7D8247B6B4F799C13306&amp;quot;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-size:75%;"&gt;%CMNG: 10,1,&amp;quot;D4862B18AC6273370888FB97E9226BBC0C52DA7E31E36204C9AD628154150A61&amp;quot;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-size:75%;"&gt;%CMNG: 10,2,&amp;quot;D35A573739C923DA63AB595741891BD7D511A0EE4D94070DC2E3A9600E61DCD8&amp;quot;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;When using Cellular monitor to program the same certificates I get this:&lt;/p&gt;
&lt;p&gt;&lt;span style="font-size:75%;"&gt;%CMNG: 10,0,&amp;quot;0E0A61E2E78D28EEA66B15A9B10C1F4E5E8AD379FEA9131D02EC4A2473F9AB9C&amp;quot;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-size:75%;"&gt;%CMNG: 10,1,&amp;quot;5E66996270A307E66456B3308AC57846491512A7C6BE9ABA56A0BE2067BB386B&amp;quot;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-size:75%;"&gt;%CMNG: 10,2,&amp;quot;D93C4F4E4092F5F2BB85240D2E015C5138A142047CE798FBEFC45D5EC2C4272A&amp;quot;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-size:inherit;"&gt;Seems the programming is going wrong i some way....&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-size:inherit;"&gt;Cannot see that I&amp;#39;m using the API in a wrong way. This is how I program the device certificate:&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;static const char devicecert[] = &lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;&amp;quot;-----BEGIN CLIENT CERTIFICATE-----\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;&amp;quot;MIIDkjCCAnqgAwIBAgIQUV/Nblig8uTS5jYZbZQqxDANBgkqhkiG9w0BAQsFADAl\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;&amp;quot;MSMwIQYDVQQDDBpQcm9sb24gSW9UIEh1YiBTdWJvcmRpbmF0ZTAeFw0yMzEyMTgx\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;&amp;quot;MzI5MzhaFw0yNDEyMTcxMzI5MzhaMG4xCzAJBgNVBAYTAkRLMRMwEQYDVQQIDApD\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;&amp;quot;b3BlbmhhZ2VuMSMwIQYDVQQKDBpQcm9sb24gQ29udHJvbCBTeXN0ZW1zIEFwUzEP\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;&amp;quot;MA0GA1UECwwGYm1zbmV0MRQwEgYDVQQDDAt0ZXN0ZGV2aWNlMjCCASIwDQYJKoZI\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;&amp;quot;hvcNAQEBBQADggEPADCCAQoCggEBAKwuYEyMQkCC7e5RLuhyXUp2imLojrALGdM2\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;&amp;quot;yx68nkDl3adAi9cueoxnKWSlyvPKjUuHIjVBK+TE7/lqY0C/n2Ek2qqcPef2eq91\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;&amp;quot;BQTtGKb9FNsTRnO/uyIki2jVVDMK95ckJFJyceDkDbhNnGktchvBBrjygKSRdb0P\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;&amp;quot;dlxvAsjPPXvodSo+indzB9yn6PXPlN7amjtnt1pD+DKyQbfQCrxTEUW5G7eVuOYL\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;&amp;quot;SVGBORbmo1dztb4sVgWED2FBAFdgxcQKy9oKewn+jLJfjGnRVpgGftFCp1cjDDeE\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;&amp;quot;ozxCJxN63JGdmKLDLT2BPZfulwNnRXEqZxhn5m5cDgg4BSTOnsUCAwEAAaN1MHMw\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;&amp;quot;HwYDVR0jBBgwFoAUyZSi36zVoNyHwg0fL45JyfK3wdkwDAYDVR0TAQH/BAIwADAT\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;&amp;quot;BgNVHSUEDDAKBggrBgEFBQcDAjAOBgNVHQ8BAf8EBAMCB4AwHQYDVR0OBBYEFCMd\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;&amp;quot;dDd/pqu+Y8B/ungcWTssi3JbMA0GCSqGSIb3DQEBCwUAA4IBAQDAcfeWeOIwO+et\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;&amp;quot;JSiindHTMfSWAijZ3Ncc5FCR5npl3p41ctL7vsiyAqxdEN6pEsR9YAyfyPykBZjg\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;&amp;quot;NITjwAuUhUv211R9WulzjVJPEJDOFbK1T6Z2Cr51hv/xJ2qZYETfBlWliCaHhXfJ\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;&amp;quot;H2Novo+LkWpNEz7yDk1/yPF5PuhFJhQlYyyFf4oys610HL5ZM8YpmGGE+fpFOjIH\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;&amp;quot;VtGq8yBTQwogqR9Ww7FwaGrVF1LQSb4ejyNhCaoQs5fmB/myBcPudwsuNdqqPZ5S\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;&amp;quot;mJx+qeIS3+eQaEtoelnWZKxXkgDhPbsRYzoKB4x8WZH3bx7gK4LB6kJyQe9v+IFV\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;&amp;quot;FBlZXfHT\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;&amp;quot;-----END CLIENT CERTIFICATE-----\n&amp;quot;;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;modem_key_mgmt_write(CONFIG_MQTT_HELPER_SEC_TAG, MODEM_KEY_MGMT_CRED_TYPE_PUBLIC_CERT, devicecert, sizeof(devicecert)-1))&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:inherit;"&gt;I know the modem cannot be online so I am programming in the following hook:&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:inherit;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;static void on_modem_lib_init(int ret, void *ctx)&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;{&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;&amp;nbsp; &amp;nbsp; LOG_INF(&amp;quot;Modem initialized&amp;quot;);&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;&amp;nbsp; &amp;nbsp; UpdateCertificates();&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;}&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;NRF_MODEM_LIB_ON_INIT(lwm2m_init_hook, on_modem_lib_init, NULL);&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:inherit;"&gt;What can be wrong?&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: API registration of certification for Azure IoT Hub / DPS</title><link>https://devzone.nordicsemi.com/thread/461301?ContentTypeID=1</link><pubDate>Wed, 20 Dec 2023 14:21:05 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:1877532c-c10a-4c79-b99c-80ac55ca6240</guid><dc:creator>Thomas</dc:creator><description>&lt;p&gt;Right. It seems that saving the certificates using&amp;nbsp;&lt;strong&gt;modem_key_mgmt_exists&lt;/strong&gt; causes the problem.&lt;/p&gt;
&lt;p&gt;I am back on my test hub using only DigiCert certificate. Programming only 3 certificates, the CA, public and private.&lt;/p&gt;
&lt;p&gt;If the 3 certificates are programmed using Cellular Monitor it works.&lt;/p&gt;
&lt;p&gt;If the same 3 certificates are programmed using the API, it does not work...&lt;/p&gt;
&lt;p&gt;Could it be the format (newlines...):&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;const char * const devicecert = &lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;-----BEGIN CLIENT CERTIFICATE-----\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;MIIDkjCCAnqgAwIBAgIQUV/Nblig8uTS5jYZbZQqxDANBgkqhkiG9w0BAQsFADAl\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;MSMwIQYDVQQDDBpQcm9sb24gSW9UIEh1YiBTdWJvcmRpbmF0ZTAeFw0yMzEyMTgx\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;MzI5MzhaFw0yNDEyMTcxMzI5MzhaMG4xCzAJBgNVBAYTAkRLMRMwEQYDVQQIDApD\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;b3BlbmhhZ2VuMSMwIQYDVQQKDBpQcm9sb24gQ29udHJvbCBTeXN0ZW1zIEFwUzEP\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;MA0GA1UECwwGYm1zbmV0MRQwEgYDVQQDDAt0ZXN0ZGV2aWNlMjCCASIwDQYJKoZI\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;hvcNAQEBBQADggEPADCCAQoCggEBAKwuYEyMQkCC7e5RLuhyXUp2imLojrALGdM2\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;yx68nkDl3adAi9cueoxnKWSlyvPKjUuHIjVBK+TE7/lqY0C/n2Ek2qqcPef2eq91\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;BQTtGKb9FNsTRnO/uyIki2jVVDMK95ckJFJyceDkDbhNnGktchvBBrjygKSRdb0P\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;dlxvAsjPPXvodSo+indzB9yn6PXPlN7amjtnt1pD+DKyQbfQCrxTEUW5G7eVuOYL\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;SVGBORbmo1dztb4sVgWED2FBAFdgxcQKy9oKewn+jLJfjGnRVpgGftFCp1cjDDeE\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;ozxCJxN63JGdmKLDLT2BPZfulwNnRXEqZxhn5m5cDgg4BSTOnsUCAwEAAaN1MHMw\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;HwYDVR0jBBgwFoAUyZSi36zVoNyHwg0fL45JyfK3wdkwDAYDVR0TAQH/BAIwADAT\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;BgNVHSUEDDAKBggrBgEFBQcDAjAOBgNVHQ8BAf8EBAMCB4AwHQYDVR0OBBYEFCMd\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;dDd/pqu+Y8B/ungcWTssi3JbMA0GCSqGSIb3DQEBCwUAA4IBAQDAcfeWeOIwO+et\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;JSiindHTMfSWAijZ3Ncc5FCR5npl3p41ctL7vsiyAqxdEN6pEsR9YAyfyPykBZjg\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;NITjwAuUhUv211R9WulzjVJPEJDOFbK1T6Z2Cr51hv/xJ2qZYETfBlWliCaHhXfJ\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;H2Novo+LkWpNEz7yDk1/yPF5PuhFJhQlYyyFf4oys610HL5ZM8YpmGGE+fpFOjIH\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;VtGq8yBTQwogqR9Ww7FwaGrVF1LQSb4ejyNhCaoQs5fmB/myBcPudwsuNdqqPZ5S\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;mJx+qeIS3+eQaEtoelnWZKxXkgDhPbsRYzoKB4x8WZH3bx7gK4LB6kJyQe9v+IFV\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;FBlZXfHT\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;-----END CLIENT CERTIFICATE-----\n&amp;quot;;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: API registration of certification for Azure IoT Hub / DPS</title><link>https://devzone.nordicsemi.com/thread/461295?ContentTypeID=1</link><pubDate>Wed, 20 Dec 2023 13:57:17 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:e4ec3f3e-ffc9-4c3e-8f1b-aac8f552b99c</guid><dc:creator>Thomas</dc:creator><description>[quote userid="93921" url="~/f/nordic-q-a/106640/api-registration-of-certification-for-azure-iot-hub-dps/461286"]My first test showed when&amp;nbsp;Baltimore in&amp;nbsp;CONFIG_MQTT_HELPER_SEC_TAG did not work, it would automatically switch to&amp;nbsp;Digicert in CONFIG_MQTT_HELPER_SECONDARY_SEC_TAG to build the connection.[/quote]
&lt;p&gt;I cannot validate this. It seems this is not correct.&lt;/p&gt;
&lt;p&gt;Hang on.... maybe wrong conclusion....&lt;/p&gt;
&lt;p&gt;I moved from programming certificates using&amp;nbsp;Cellular Monitor to programming certificates using&amp;nbsp;modem_key_mgmt_write. This might be the problem....&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: API registration of certification for Azure IoT Hub / DPS</title><link>https://devzone.nordicsemi.com/thread/461294?ContentTypeID=1</link><pubDate>Wed, 20 Dec 2023 13:45:25 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:1a512c13-5848-4a5a-bb86-0999766dedc3</guid><dc:creator>Thomas</dc:creator><description>&lt;p&gt;It seems that as soon as I register two root CA.&lt;/p&gt;
&lt;p&gt;DigiCert in tag&amp;nbsp;&lt;span&gt;CONFIG_MQTT_HELPER_SEC_TAG&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Baltimore in tag&amp;nbsp;&lt;span&gt;CONFIG_MQTT_HELPER_SECONDARY_SEC_TAG&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;I cannot connect to any IoT hub anymore.....&lt;/p&gt;
&lt;p&gt;I am testing agains two different IoT hubs, one running with DigiCert and one running with Baltimore. Function was as expected as long as I only registered one CA on the&amp;nbsp;&lt;span&gt;CONFIG_MQTT_HELPER_SEC_TAG.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;I am validating this...&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: API registration of certification for Azure IoT Hub / DPS</title><link>https://devzone.nordicsemi.com/thread/461292?ContentTypeID=1</link><pubDate>Wed, 20 Dec 2023 13:43:01 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:1a8cf0c5-0a65-4911-a464-99f5710df67f</guid><dc:creator>Thomas</dc:creator><description>&lt;p&gt;How do I control which&amp;nbsp;security tag is used. I have&amp;nbsp;not found a way to do this?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: API registration of certification for Azure IoT Hub / DPS</title><link>https://devzone.nordicsemi.com/thread/461286?ContentTypeID=1</link><pubDate>Wed, 20 Dec 2023 13:31:18 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:f42cbf46-a0ad-42bd-b0ea-5327fc7d02f1</guid><dc:creator>Charlie</dc:creator><description>&lt;div&gt;[quote user="tmaltesen"]I wanted to validate what types are used in the 3 windows of Cellular Monitor...[/quote]&lt;/div&gt;
&lt;div&gt;&lt;span&gt;Certificate Manager windows correspond to the following tree types.&amp;nbsp;NCS\v2.5.0\nrf\samples\cellular\http_update samples demonstrate how to properly write certificates in fw.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;MODEM_KEY_MGMT_CRED_TYPE_CA_CHAIN&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;MODEM_KEY_MGMT_CRED_TYPE_PUBLIC_CERT&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;MODEM_KEY_MGMT_CRED_TYPE_PRIVATE_CERT&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;This is not suggested since it will occupy many memory sizes and is also not secure.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;[quote user="tmaltesen"]My hub is currently running with Baltimore so to connect now I need Baltimore and at an unknown time it will change to Digicert. If I do not have both certificates in the device I will loose connection.[/quote]
&lt;p&gt;&lt;span&gt;Couldn&amp;#39;t the two sets of keys stored in different secure tags solve your problem?&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;My first test showed when&amp;nbsp;Baltimore in&amp;nbsp;CONFIG_MQTT_HELPER_SEC_TAG did not work, it would automatically switch to&amp;nbsp;Digicert in CONFIG_MQTT_HELPER_SECONDARY_SEC_TAG to build the connection.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Best regards,&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Charlie&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: API registration of certification for Azure IoT Hub / DPS</title><link>https://devzone.nordicsemi.com/thread/461282?ContentTypeID=1</link><pubDate>Wed, 20 Dec 2023 13:07:58 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:b281eeee-23a2-4dd4-a1e5-68661fe6f148</guid><dc:creator>Thomas</dc:creator><description>&lt;p&gt;Another huge problem. I need two root CA in the device.&lt;/p&gt;
&lt;p&gt;I need both Baltimore and Digicert to exist in my device......&lt;/p&gt;
&lt;p&gt;My hub is currently running with Baltimore so to connect now I need Baltimore and at an unknown time it will change to Digicert. If I do not have both certificates in the device I will loose connection.&lt;/p&gt;
&lt;p&gt;The current 3 certificates are downloaded with key 10.&lt;/p&gt;
&lt;p&gt;Should I just add 3 certificates with key 11 also replacing the CA for Baltimore with Digicert&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: API registration of certification for Azure IoT Hub / DPS</title><link>https://devzone.nordicsemi.com/thread/461280?ContentTypeID=1</link><pubDate>Wed, 20 Dec 2023 13:05:43 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:fe7af4c9-98b8-4c9d-ae98-a5120135719e</guid><dc:creator>Thomas</dc:creator><description>&lt;p&gt;I got it connected using Cellular Monitor and fixed on mistake by me. My thumprint was from the subordinate certificate. When creating a device directly like this, it is the thumprint of the device certificate.&lt;/p&gt;
&lt;p&gt;These are the 3 certificates used when writing from Cellular Monitor.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;&lt;span&gt;MODEM_KEY_MGMT_CRED_TYPE_CA_CHAIN&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;span&gt;MODEM_KEY_MGMT_CRED_TYPE_PRIVATE_CERT&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&lt;span&gt;MODEM_KEY_MGMT_CRED_TYPE_PUBLIC_CERT&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;Moving to test on my own hub if this succeeds I will test with DPS.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;I have verified that I can connect to my own hub if I replace the Digicert root CA with the Baltimore one.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: API registration of certification for Azure IoT Hub / DPS</title><link>https://devzone.nordicsemi.com/thread/461257?ContentTypeID=1</link><pubDate>Wed, 20 Dec 2023 10:38:50 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:08194135-0850-4d04-8d74-dfe1c2574ea0</guid><dc:creator>Charlie</dc:creator><description>[quote user="tmaltesen"]When uploading a certificate to Azure IoT hub certificates list, are you using the PEM file with only the generated &lt;span&gt;s&lt;/span&gt;&lt;span&gt;ubordinate&amp;nbsp;&lt;/span&gt;certificate or a manually combined file with the certificate section for both &lt;span&gt;s&lt;/span&gt;&lt;span&gt;ubordinate&amp;nbsp;&lt;/span&gt;and slef-signed&amp;nbsp;root CA?[/quote]
&lt;p&gt;I uploaded the&amp;nbsp;&lt;span&gt;PEM file with only the generated&amp;nbsp;&lt;/span&gt;&lt;span&gt;s&lt;/span&gt;&lt;span&gt;ubordinate&amp;nbsp;&lt;/span&gt;&lt;span&gt;certificate.&lt;/span&gt;&lt;/p&gt;
[quote user="tmaltesen"]When adding your testdevice do you set authentificate to &amp;quot;X.509 Self-Signed&amp;quot; or &amp;quot;X.509 CA Signed&amp;quot;?[/quote]
&lt;p&gt;It uses&amp;nbsp;X.509 Self-Signed. I input the secondary&amp;nbsp;thump print same as the first.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Best regards,&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;Charlie&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: API registration of certification for Azure IoT Hub / DPS</title><link>https://devzone.nordicsemi.com/thread/461241?ContentTypeID=1</link><pubDate>Wed, 20 Dec 2023 09:56:02 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:19528399-aace-4464-99f5-b55fb362caab</guid><dc:creator>Thomas</dc:creator><description>&lt;p&gt;If just using IoT hub, how do you add the device, especially authentification!&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: API registration of certification for Azure IoT Hub / DPS</title><link>https://devzone.nordicsemi.com/thread/461240?ContentTypeID=1</link><pubDate>Wed, 20 Dec 2023 09:53:12 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:904f9109-80f4-415f-8106-a1ef636feee6</guid><dc:creator>Charlie</dc:creator><description>&lt;p&gt;Hi Thomas,&lt;/p&gt;
[quote user="tmaltesen"]Could you share the test certificates and the exact way you register them?[/quote]
&lt;p&gt;I&amp;nbsp;can share more details about how I register them.&lt;/p&gt;
&lt;p&gt;1. Follow&amp;nbsp;&lt;a href="https://learn.microsoft.com/en-us/azure/iot-hub/tutorial-x509-test-certs?tabs=windows"&gt;Tutorial - Create and upload certificates for testing - Azure IoT Hub | Microsoft Learn&lt;/a&gt;&amp;nbsp;you will get the following keys.&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;C:\NCS\AzureIoTCerts&amp;gt;dir /s
 Volume in drive C has no label.
 Volume Serial Number is 7C9B-FC43

 Directory of C:\NCS\AzureIoTCerts

18/12/2023  15:21    &amp;lt;DIR&amp;gt;          .
18/12/2023  15:21    &amp;lt;DIR&amp;gt;          ..
18/12/2023  15:18    &amp;lt;DIR&amp;gt;          rootca
18/12/2023  16:08    &amp;lt;DIR&amp;gt;          subca
               0 File(s)              0 bytes

 Directory of C:\NCS\AzureIoTCerts\rootca

18/12/2023  15:18    &amp;lt;DIR&amp;gt;          .
18/12/2023  15:18    &amp;lt;DIR&amp;gt;          ..
18/12/2023  16:04    &amp;lt;DIR&amp;gt;          certs
18/12/2023  16:04    &amp;lt;DIR&amp;gt;          db
18/12/2023  15:10    &amp;lt;DIR&amp;gt;          private
18/12/2023  15:16             2,099 rootca.conf
18/12/2023  15:18             4,135 rootca.crt
18/12/2023  15:16             1,022 rootca.csr
               3 File(s)          7,256 bytes

 Directory of C:\NCS\AzureIoTCerts\rootca\certs

18/12/2023  16:04    &amp;lt;DIR&amp;gt;          .
18/12/2023  16:04    &amp;lt;DIR&amp;gt;          ..
18/12/2023  15:18             4,135 88A8F7A2E59F52BF8F8EA450CDBB125E.pem
18/12/2023  16:04             4,484 88A8F7A2E59F52BF8F8EA450CDBB1260.pem
               2 File(s)          8,619 bytes

 Directory of C:\NCS\AzureIoTCerts\rootca\db

18/12/2023  16:04    &amp;lt;DIR&amp;gt;          .
18/12/2023  16:04    &amp;lt;DIR&amp;gt;          ..
18/12/2023  15:03                 5 crlnumber
18/12/2023  16:04               231 index
18/12/2023  16:04                21 index.attr
18/12/2023  15:25                21 index.attr.old
18/12/2023  15:25               157 index.old
18/12/2023  16:04                34 serial
18/12/2023  15:25                34 serial.old
               7 File(s)            503 bytes

 Directory of C:\NCS\AzureIoTCerts\rootca\private

18/12/2023  15:10    &amp;lt;DIR&amp;gt;          .
18/12/2023  15:10    &amp;lt;DIR&amp;gt;          ..
18/12/2023  15:16             1,884 rootca.key
               1 File(s)          1,884 bytes

 Directory of C:\NCS\AzureIoTCerts\subca

18/12/2023  16:08    &amp;lt;DIR&amp;gt;          .
18/12/2023  16:08    &amp;lt;DIR&amp;gt;          ..
18/12/2023  16:08    &amp;lt;DIR&amp;gt;          certs
18/12/2023  16:08    &amp;lt;DIR&amp;gt;          db
18/12/2023  16:05    &amp;lt;DIR&amp;gt;          private
18/12/2023  16:02             2,094 subca.conf
18/12/2023  16:04             4,484 subca.crt
18/12/2023  16:03             1,018 subca.csr
18/12/2023  16:08             4,552 testdevice.crt
18/12/2023  16:07             1,002 testdevice.csr
               5 File(s)         13,150 bytes

 Directory of C:\NCS\AzureIoTCerts\subca\certs

18/12/2023  16:08    &amp;lt;DIR&amp;gt;          .
18/12/2023  16:08    &amp;lt;DIR&amp;gt;          ..
18/12/2023  16:08             4,552 EE3E911808A245024E9E824AC8F90B4E.pem
               1 File(s)          4,552 bytes

 Directory of C:\NCS\AzureIoTCerts\subca\db

18/12/2023  16:08    &amp;lt;DIR&amp;gt;          .
18/12/2023  16:08    &amp;lt;DIR&amp;gt;          ..
18/12/2023  15:58                 5 crlnumber
18/12/2023  16:08               120 index
18/12/2023  16:08                21 index.attr
18/12/2023  15:58                 0 index.old
18/12/2023  16:08                34 serial
18/12/2023  15:58                34 serial.old
               6 File(s)            214 bytes

 Directory of C:\NCS\AzureIoTCerts\subca\private

18/12/2023  16:05    &amp;lt;DIR&amp;gt;          .
18/12/2023  16:05    &amp;lt;DIR&amp;gt;          ..
18/12/2023  16:03             1,884 subca.key
18/12/2023  16:05             1,732 testdevice.key
               2 File(s)          3,616 bytes

     Total Files Listed:
              27 File(s)         39,794 bytes
              26 Dir(s)  101,159,108,608 bytes free&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;2. Upload&amp;nbsp;&lt;span&gt;subordinate CA certificate&amp;nbsp;&lt;/span&gt;C:\NCS\AzureIoTCerts\rootca\certs&lt;span&gt;\&lt;/span&gt;88A8F7A2E59F52BF8F8EA450CDBB1260.pem to IoT Hub or DSP&amp;nbsp;&lt;strong&gt;Certificates page.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;3. Copy and write the following keys into the device.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Server rootCA:&amp;nbsp;&amp;nbsp;DigiCertGlobalRootG2.crt.pem or&amp;nbsp; BaltimoreCyberTrustRoot.crt.pem&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Client certificate:&amp;nbsp;&amp;nbsp;C:\NCS\AzureIoTCerts\subca\certs\EE3E911808A245024E9E824AC8F90B4E.pem&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Client private key:&amp;nbsp;C:\NCS\AzureIoTCerts\subca\private\testdevice.key&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Program AT client or SLM sample first, then use Certificate Manager to write keys.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;img style="max-height:240px;max-width:640px;" alt=" " src="https://devzone.nordicsemi.com/resized-image/__size/1280x480/__key/communityserver-discussions-components-files/4/3312.program-SLM.png" /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;img style="max-height:240px;max-width:640px;" alt=" " src="https://devzone.nordicsemi.com/resized-image/__size/1280x480/__key/communityserver-discussions-components-files/4/6545.certificateManager.png" /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;img style="max-height:240px;max-width:640px;" alt=" " src="https://devzone.nordicsemi.com/resized-image/__size/1280x480/__key/communityserver-discussions-components-files/4/4073.nRF-Serial-Terminal.png" /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;If you are testing IoT Hub without DSP, remember to set the following configuration&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;&lt;span&gt;CONFIG_AZURE_IOT_HUB_DEVICE_ID&lt;/span&gt;&lt;span&gt;=&lt;/span&gt;&lt;span&gt;&amp;quot;testdevice&amp;quot; # same as&amp;nbsp;Subject Common Name (CN) field when you generate certificates&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;span&gt;CONFIG_AZURE_IOT_HUB_HOSTNAME&lt;/span&gt;&lt;span&gt;=&lt;/span&gt;&lt;span&gt;&amp;quot;&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;Just let me know if there is anything else you feel confused.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;span&gt;Best regards,&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Charlie&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: API registration of certification for Azure IoT Hub / DPS</title><link>https://devzone.nordicsemi.com/thread/461223?ContentTypeID=1</link><pubDate>Wed, 20 Dec 2023 08:56:04 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:8bc29be2-a15c-4525-98a3-1e5958cb84de</guid><dc:creator>Thomas</dc:creator><description>&lt;p&gt;A few questions (I think I have tried the different combinations, but....)&lt;/p&gt;
&lt;p&gt;When uploading a certificate to Azure IoT hub certificates list, are you using the PEM file with only the generated &lt;span&gt;s&lt;/span&gt;&lt;span&gt;ubordinate&amp;nbsp;&lt;/span&gt;certificate or a manually combined file with the certificate section for both &lt;span&gt;s&lt;/span&gt;&lt;span&gt;ubordinate&amp;nbsp;&lt;/span&gt;and slef-signed&amp;nbsp;root CA?&lt;/p&gt;
&lt;p&gt;When adding your testdevice do you set authentificate to &amp;quot;X.509 Self-Signed&amp;quot; or &amp;quot;X.509 CA Signed&amp;quot;?&lt;/p&gt;
&lt;p&gt;If you&amp;nbsp;select&amp;nbsp;&amp;quot;X.509 Self-Signed&amp;quot;, what secondary thump print do you use?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: API registration of certification for Azure IoT Hub / DPS</title><link>https://devzone.nordicsemi.com/thread/461212?ContentTypeID=1</link><pubDate>Wed, 20 Dec 2023 07:44:06 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:1f05b66b-2de7-4d59-b375-38431af9e84f</guid><dc:creator>Thomas</dc:creator><description>&lt;p&gt;Hi Charlie&lt;/p&gt;
&lt;p&gt;Thanks a lot for the effort :-)&lt;/p&gt;
&lt;p&gt;Unfortunately I am still unable to connect.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Could you share the test certificates and the exact way you register them?&lt;/p&gt;
&lt;p&gt;I do know about the Baltimore/Digicert certificate change as I have several other device types and many devices running on the IoT Hub. The IoT hub I want to connect to is still using the Baltimore certificate. So I am registering this as&amp;nbsp; CONFIG_MQTT_HELPER_SEC_TAG. The certificates (PEM) was downloaded from a Microsoft page with a description of the two certificates.&lt;/p&gt;
&lt;p&gt;I am now going to spin up a new test IoT Hub in a region where I know it will run Digicert and test that situation.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: API registration of certification for Azure IoT Hub / DPS</title><link>https://devzone.nordicsemi.com/thread/461093?ContentTypeID=1</link><pubDate>Tue, 19 Dec 2023 14:23:40 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:d47b5d70-1aea-474c-835e-2fe71042709f</guid><dc:creator>Charlie</dc:creator><description>&lt;p&gt;Hi Thomas,&lt;/p&gt;
&lt;p&gt;Here is the brief report from my tests.&lt;/p&gt;
&lt;p&gt;1) No DSP&lt;/p&gt;
&lt;p&gt;I got the same -111 error as you did on the first try, but when I&amp;nbsp;replaced BaltimoreCyberTrustRoot.crt.pem with&amp;nbsp;&lt;span&gt;DigiCertGlobalRootG2.crt.pem&amp;nbsp;as root CA or&amp;nbsp;set&amp;nbsp;DigiCertGlobalRootG2.crt.pem rootCA, client certificate and private key in second security tag 11,&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;then the issue is solved.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;a href="https://devzone.nordicsemi.com/cfs-file/__key/communityserver-discussions-components-files/4/azureIoT_5F00_NO_5F00_DPS.log"&gt;devzone.nordicsemi.com/.../azureIoT_5F00_NO_5F00_DPS.log&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;2) With DSP&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;I test with BaltimoreCyberTrustRoot.crt.crt.pem&amp;nbsp;as root CA, client certificate and private key in security tag 10&amp;nbsp;and set&amp;nbsp;DigiCertGlobalRootG2.crt.pem rootCA, client certificate and private key in second security tag 11, also set&amp;nbsp;&lt;/span&gt;&lt;span&gt;CONFIG_AZURE_IOT_HUB_DEVICE_ID&lt;/span&gt;&lt;span&gt;=&lt;/span&gt;&lt;span&gt;&amp;quot;testdevice&amp;quot; in prj.conf since &amp;quot;the client certificate must have the value of its Subject Common Name (CN) field set to the value of the device ID.&amp;quot; according to&amp;nbsp;&lt;a href="https://learn.microsoft.com/en-us/azure/iot-hub/tutorial-x509-test-certs?tabs=windows"&gt;Tutorial - Create and upload certificates for testing - Azure IoT Hub | Microsoft Learn&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;a href="https://devzone.nordicsemi.com/cfs-file/__key/communityserver-discussions-components-files/4/azureIoT_5F00_DPS.log"&gt;devzone.nordicsemi.com/.../azureIoT_5F00_DPS.log&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;What I have observed is fit for the CA migration timeline you can find from the following page.&amp;nbsp;BaltimoreCyberTrustRoot.crt.pem is not valid for IoT Hub any more after October 15, 2023, but still valid for DSP, until February 15, 2024.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;a href="https://techcommunity.microsoft.com/t5/internet-of-things-blog/azure-iot-tls-critical-changes-are-almost-here-and-why-you/ba-p/2393169"&gt;Azure IoT TLS: Critical changes are almost here! (…and why you should care) - Microsoft Community Hub&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;img style="max-height:240px;max-width:640px;" alt=" " src="https://devzone.nordicsemi.com/resized-image/__size/1280x480/__key/communityserver-discussions-components-files/4/RAMIoT_5F00_0_2D00_1671571540145.png" /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Best regards,&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Charlie&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: API registration of certification for Azure IoT Hub / DPS</title><link>https://devzone.nordicsemi.com/thread/460893?ContentTypeID=1</link><pubDate>Mon, 18 Dec 2023 16:01:33 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:9b4e8cff-83ed-466f-921e-25592659b69c</guid><dc:creator>Thomas</dc:creator><description>&lt;p&gt;Great :-) Thanks a lot I will look forward to hearing the result :-)&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: API registration of certification for Azure IoT Hub / DPS</title><link>https://devzone.nordicsemi.com/thread/460892?ContentTypeID=1</link><pubDate>Mon, 18 Dec 2023 15:59:03 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:6524bfd5-02a5-4fb9-97c1-3eadfd3e30f3</guid><dc:creator>Charlie</dc:creator><description>&lt;p&gt;Hi Thomas,&lt;/p&gt;
&lt;p&gt;I will give it a try tomorrow. I also feel there might be something wrong with the certificate writing.&lt;/p&gt;
&lt;p&gt;I&amp;nbsp;would try with nRF Cloud first to see if there is something different when writing certificate keys.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Charlie&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: API registration of certification for Azure IoT Hub / DPS</title><link>https://devzone.nordicsemi.com/thread/460860?ContentTypeID=1</link><pubDate>Mon, 18 Dec 2023 14:31:40 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:0d4769cc-5195-48a6-8de4-e1e7ed6ef51d</guid><dc:creator>Thomas</dc:creator><description>&lt;p&gt;Hi Charlie&lt;/p&gt;
&lt;p&gt;I have not tested different things to see if I can find a solution....&lt;/p&gt;
&lt;p&gt;I have gone through the the Microsoft tutorial on creating and uploading certificates from the beginning again. This was to test that I did not have a problem with the certificates. I have created new internal root CA, subordinate and device certificates.&lt;/p&gt;
&lt;p&gt;From this I have&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Internal root CA&lt;/li&gt;
&lt;li&gt;Subordinate certificate used for creating device certificates&lt;/li&gt;
&lt;li&gt;Device certificate(s)&lt;/li&gt;
&lt;li&gt;Device private key(s)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;I also have two other public certificates old and new IoT hub&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Baltimore&lt;/li&gt;
&lt;li&gt;DigiCert&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;There are a number of different ways I can register these certificates in the device.... Is it possible that someone can describe this process from within the application.&lt;/p&gt;
&lt;p&gt;I think the only certificates needed in the device is&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Device certificate(s)&lt;/li&gt;
&lt;li&gt;Device private key(s)&lt;/li&gt;
&lt;li&gt;Baltimore&lt;/li&gt;
&lt;li&gt;DigiCert&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;So I&amp;#39;m doing:&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;modem_key_mgmt_write(CONFIG_MQTT_HELPER_SEC_TAG, MODEM_KEY_MGMT_CRED_TYPE_CA_CHAIN, digicert, sizeof(digicert));&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;modem_key_mgmt_write(CONFIG_MQTT_HELPER_SECONDARY_SEC_TAG,MODEM_KEY_MGMT_CRED_TYPE_CA_CHAIN, baltimore, sizeof(baltimore));&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;modem_key_mgmt_write(CONFIG_MQTT_HELPER_SEC_TAG, MODEM_KEY_MGMT_CRED_TYPE_PUBLIC_CERT, devicecert, sizeof(devicecert));&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;modem_key_mgmt_write(CONFIG_MQTT_HELPER_SEC_TAG, MODEM_KEY_MGMT_CRED_TYPE_PRIVATE_CERT, devicecertpriv, sizeof(devicecertpriv))&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: API registration of certification for Azure IoT Hub / DPS</title><link>https://devzone.nordicsemi.com/thread/460541?ContentTypeID=1</link><pubDate>Fri, 15 Dec 2023 12:36:55 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:297d5ebf-2007-464b-b97a-abf809fcb739</guid><dc:creator>Thomas</dc:creator><description>&lt;p&gt;I have now also tested connecting directly to the IoT Hub.&lt;/p&gt;
&lt;p&gt;Following the guide for certificates I have uploadede the generated root CA PEM file to the certificates list in the IoT Hub, then manually added the device and set the Authentification type to &amp;quot;X.509 CA Signed&amp;quot;.&lt;/p&gt;
&lt;p&gt;Same result, I still get a -111 error....&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: API registration of certification for Azure IoT Hub / DPS</title><link>https://devzone.nordicsemi.com/thread/460534?ContentTypeID=1</link><pubDate>Fri, 15 Dec 2023 12:18:35 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:65f28544-1732-41e5-ad51-da045cfaaec1</guid><dc:creator>Thomas</dc:creator><description>&lt;p&gt;It seems to be exactly what I have done.&lt;/p&gt;
&lt;p&gt;I have created my own Root CA and uploaded it to the DPS and trusted it during updload.&lt;/p&gt;
&lt;p&gt;Following the recommended guide (&lt;a href="https://learn.microsoft.com/en-us/azure/iot-hub/tutorial-x509-test-certs?tabs=linux"&gt;https://learn.microsoft.com/en-us/azure/iot-hub/tutorial-x509-test-certs?tabs=linux&lt;/a&gt;), I have also created a subordinate CA and based on this created certificate files for the device.&lt;/p&gt;
&lt;p&gt;In the device I am registering certificates with:&amp;nbsp;&lt;strong&gt;modem_key_mgmt&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Since it is not working I am worried that the parameters for the modem_key_mgmt is wrong:&lt;/p&gt;
&lt;p&gt;Removin some code checks and certificates I have the following:&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;const char* const digicert = &lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;-----BEGIN CERTIFICATE-----\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;MIIDjjCCAnagAwIBAgIQAzrx5qcRqaC7KGSxHQn65TANBgkqhkiG9w0BAQsFADBh\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBH\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;MjAeFw0xMzA4MDExMjAwMDBaFw0zODAxMTUxMjAwMDBaMGExCzAJBgNVBAYTAlVT\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;b20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IEcyMIIBIjANBgkqhkiG\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuzfNNNx7a8myaJCtSnX/RrohCgiN9RlUyfuI\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;2/Ou8jqJkTx65qsGGmvPrC3oXgkkRLpimn7Wo6h+4FR1IAWsULecYxpsMNzaHxmx\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;1x7e/dfgy5SDN67sH0NO3Xss0r0upS/kqbitOtSZpLYl6ZtrAGCSYP9PIUkY92eQ\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;q2EGnI/yuum06ZIya7XzV+hdG82MHauVBJVJ8zUtluNJbd134/tJS7SsVQepj5Wz\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;tCO7TG1F8PapspUwtP1MVYwnSlcUfIKdzXOS0xZKBgyMUNGPHgm+F6HmIcr9g+UQ\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;vIOlCsRnKPZzFBQ9RnbDhxSJITRNrw9FDKZJobq7nMWxM4MphQIDAQABo0IwQDAP\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;BgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAdBgNVHQ4EFgQUTiJUIBiV\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;5uNu5g/6+rkS7QYXjzkwDQYJKoZIhvcNAQELBQADggEBAGBnKJRvDkhj6zHd6mcY\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;1Yl9PMWLSn/pvtsrF9+wX3N3KjITOYFnQoQj8kVnNeyIv/iPsGEMNKSuIEyExtv4\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;NeF22d+mQrvHRAiGfzZ0JFrabA0UWTW98kndth/Jsw1HKj2ZL7tcu7XUIOGZX1NG\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;Fdtom/DzMNU+MeKNhJ7jitralj41E6Vf8PlwUHBHQRFXGU7Aj64GxJUTFy8bJZ91\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;8rGOmaFvE7FBcf6IKshPECBV1/MUReXgRPTqh5Uykw7+U0b6LJ3/iyK5S9kJRaTe\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;pLiaWN0bfVKfjllDiIGknibVb63dDcY3fe0Dkhvld1927jyNxF1WW6LZZm6zNTfl\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;MrY=\n&amp;quot;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;font-size:75%;"&gt;&amp;quot;-----END CERTIFICATE-----&amp;quot;;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;span style="font-size:75%;"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;span style="font-size:75%;"&gt;modem_key_mgmt_write(CONFIG_MQTT_HELPER_SEC_TAG, MODEM_KEY_MGMT_CRED_TYPE_CA_CHAIN,&amp;nbsp; digicert, sizeof(digicert));&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;modem_key_mgmt_write(CONFIG_MQTT_HELPER_SECONDARY_SEC_TAG, MODEM_KEY_MGMT_CRED_TYPE_CA_CHAIN, baltimore, sizeof(baltimore))&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;modem_key_mgmt_write(CONFIG_MQTT_HELPER_SEC_TAG, MODEM_KEY_MGMT_CRED_TYPE_PUBLIC_CERT, devicecert, sizeof(devicecert))&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;modem_key_mgmt_write(CONFIG_MQTT_HELPER_SEC_TAG, MODEM_KEY_MGMT_CRED_TYPE_PRIVATE_CERT, devicecertpriv, sizeof(devicecertpriv))&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="font-size:75%;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;Since it is not working I am wondering about the sec_tag parameter CONFIG_MQTT_HELPER_SEC_TAG is this the correct use?&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;I have also the Baltimore certificate as you can see and the two device certificates are the content from the PEM files in the &amp;quot;certs&amp;quot; folder and the &amp;quot;private&amp;quot; folder from the example.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;I get the -111 error during MQTT connect. Does this mean that it is only related to the DigiCert/Baltimore or would i fail with the samme error if it was device trust?&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: API registration of certification for Azure IoT Hub / DPS</title><link>https://devzone.nordicsemi.com/thread/460526?ContentTypeID=1</link><pubDate>Fri, 15 Dec 2023 11:56:52 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:a8e16e3d-c68a-4fc4-84ae-f62e7b3dbd50</guid><dc:creator>Thomas</dc:creator><description>&lt;p&gt;Thanks a lot I did not find the other case when searching, so I will look&amp;nbsp;on that and&amp;nbsp;check the details.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: API registration of certification for Azure IoT Hub / DPS</title><link>https://devzone.nordicsemi.com/thread/460514?ContentTypeID=1</link><pubDate>Fri, 15 Dec 2023 10:28:45 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:478b7ada-6aa6-4c58-b412-e21d41c6f051</guid><dc:creator>Charlie</dc:creator><description>&lt;p&gt;Hi Thomas,&lt;/p&gt;
&lt;p&gt;Thanks for checking with us. The error is also reported in the following case. Have you read through it before to find some hint?&lt;/p&gt;
&lt;p&gt;&lt;a href="https://devzone.nordicsemi.com/f/nordic-q-a/81795/sample-azure-iot-hub-thingy9-1/340244"&gt;(+) Sample Azure IoT Hub (Thingy9.1) - Nordic Q&amp;amp;A - Nordic DevZone - Nordic DevZone (nordicsemi.com)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Charlie&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: API registration of certification for Azure IoT Hub / DPS</title><link>https://devzone.nordicsemi.com/thread/460416?ContentTypeID=1</link><pubDate>Thu, 14 Dec 2023 15:43:58 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:bf52d077-621f-41e7-88e3-fc600014b2c5</guid><dc:creator>Thomas</dc:creator><description>&lt;p&gt;I was wondering if the two root CA&amp;#39;s should be saved as&amp;nbsp;MODEM_KEY_MGMT_CRED_TYPE_CA_CHAIN instead, but it does not seem to make a difference.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>