<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Provisiong a 9160 on our AWS VPC</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/118545/provisiong-a-9160-on-our-aws-vpc</link><description>We&amp;#39;re attempting to provision one of our nRF9160-based IoT devices to our AWS VPC. 
 We&amp;#39;re following this procedure: 
 Provisioning our eDude on AWS 
 Step 1: Provision the IoT Device (nRF9160) 
 
 Install Required Software 
 
 Ensure your development</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Wed, 05 Feb 2025 09:08:25 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/118545/provisiong-a-9160-on-our-aws-vpc" /><item><title>RE: Provisiong a 9160 on our AWS VPC</title><link>https://devzone.nordicsemi.com/thread/521480?ContentTypeID=1</link><pubDate>Wed, 05 Feb 2025 09:08:25 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:c9a20bd5-d5b1-42ea-ab90-24a750d59882</guid><dc:creator>&amp;#216;yvind</dc:creator><description>&lt;p&gt;Hey! That is great news! Happy to hear that you have solved the issue.&lt;/p&gt;
&lt;p&gt;Kind regards,&lt;br /&gt;Øyvind&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Provisiong a 9160 on our AWS VPC</title><link>https://devzone.nordicsemi.com/thread/521422?ContentTypeID=1</link><pubDate>Tue, 04 Feb 2025 23:41:13 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:6b9f3e50-6f71-4d50-b953-0ea56d78789a</guid><dc:creator>JackW</dc:creator><description>&lt;p&gt;Hi Oyvind,&lt;br /&gt;&lt;br /&gt;Thanks for looking into this case for us, however we have solved our problem.&amp;nbsp; We now have one of our nRF9160 based devices successfully sending MQTT messages to an IoT Thing that we created in our AWS VPC.&amp;nbsp; So, no further help required for now.&lt;/p&gt;
&lt;p&gt;Thanks&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Provisiong a 9160 on our AWS VPC</title><link>https://devzone.nordicsemi.com/thread/521094?ContentTypeID=1</link><pubDate>Mon, 03 Feb 2025 11:56:11 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:892b6340-06fd-4c8d-a892-88f93cd97ea7</guid><dc:creator>&amp;#216;yvind</dc:creator><description>&lt;p&gt;Hello &lt;a href="https://devzone.nordicsemi.com/members/jackw"&gt;JackW&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;I am Øyvind from the Nordic Tech support team. Are you able to provide logs output from your device when it times out? Do you receive any other error? Have you verified that your device is connected to LTE network? Have you followed all steps in&amp;nbsp;&lt;a href="https://docs.nordicsemi.com/bundle/ncs-latest/page/nrf/libraries/networking/aws_iot.html#setting_up_aws_and_configuring_permissions"&gt;Setting up AWS and configuring permissions&lt;/a&gt;? Have a look at&amp;nbsp;&lt;a href="https://docs.aws.amazon.com/iot/latest/developerguide/life-cycle-events.html"&gt;Lifecycle events&lt;/a&gt;, where you can e.g. see the reason why the client is disconnecting on the server side&lt;/p&gt;
[quote user=""]You&amp;#39;ll need to securely load AWS IoT credentials onto your &lt;strong&gt;nRF9160&lt;/strong&gt;:[/quote]
&lt;p&gt;could you please elaborate more on exactly what version of the nRF Connect SDK you are working with? From the description you have provided, these steps seems a little outdated, also with regards to handling certificates.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Kind regards,&lt;br /&gt;Øyvind Sandberg&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Provisiong a 9160 on our AWS VPC</title><link>https://devzone.nordicsemi.com/thread/521004?ContentTypeID=1</link><pubDate>Sun, 02 Feb 2025 17:24:31 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:a199a683-bdee-4b25-8f49-c7e39e4f3892</guid><dc:creator>JackW</dc:creator><description>&lt;p&gt;Hi Achim.&amp;nbsp; I think we have a misunderstanding.&lt;br /&gt;&lt;br /&gt;We believe we have successfully flashed our certificates into the 9160, so we weren&amp;#39;t looking for help with the AT%CMNG command.&lt;br /&gt;&lt;br /&gt;What we&amp;#39;re looknig for is making sure that all the other variables needed to make MQTT work between the 9160 and our AWS VPC are configured correctly in our firmware.&lt;br /&gt;&lt;br /&gt;We&amp;#39;re also looking for ways to troubleshoot the AWS side of things.&amp;nbsp; I now understand that that&amp;#39;s not your expertise, so I&amp;#39;ll try AWS tech support next.&lt;br /&gt;&lt;br /&gt;Thanks again for your help, I really appreciate it.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Provisiong a 9160 on our AWS VPC</title><link>https://devzone.nordicsemi.com/thread/520992?ContentTypeID=1</link><pubDate>Sun, 02 Feb 2025 10:00:10 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:9bc92ce9-be4c-4b26-bd8b-4890402dd6d2</guid><dc:creator>Achim Kraus</dc:creator><description>&lt;p&gt;The &amp;quot;AT%CMNG&amp;quot; above is a link to the documentation of that command. Did you try to read it?&lt;/p&gt;
&lt;p&gt;I&amp;#39;m not common to the MQTT nor AWS samples, I used &lt;a href="https://github.com/nrfconnect/sdk-nrf/tree/main/samples/net/https_client"&gt;samples/net/https_client&lt;/a&gt; to start with. That uses the C API instead of the AT commands but is logically the same. For MQTT/AWS maybe someone from Nordic helps (I&amp;#39;m an other user).&lt;/p&gt;
&lt;p&gt;You mainly store all credentials you need for a connection with one &amp;quot;sec_tag&amp;quot;, which is then also passed to the socket (similar line &amp;quot;setsockopt(fd, SOL_TLS, TLS_SEC_TAG_LIST, tls_sec_tag, sizeof(tls_sec_tag));&amp;quot; in the https_client sample). For certificate based connections that&amp;#39;s the &amp;quot;Root CA certificate/0&amp;quot; (sometimes called the &amp;quot;trust anchor&amp;quot;). If you want to authenticate your client also using a client certificate, you need to provide also the &amp;quot;Client certificate/1&amp;quot; and the corresponding &amp;quot;Client private key/2&amp;quot;. Usually the &amp;quot;client certificate&amp;quot; must be signed by a CA the server trusts. Though I&amp;#39;m not common to MQTT/AWS the exact procedure, how that is handled for AWS, is unknown by me.&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Provisiong a 9160 on our AWS VPC</title><link>https://devzone.nordicsemi.com/thread/520983?ContentTypeID=1</link><pubDate>Sat, 01 Feb 2025 19:14:27 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:b01b2336-3f72-4ca8-9f64-91cd744e9709</guid><dc:creator>JackW</dc:creator><description>&lt;p&gt;Thanks Achim.&amp;nbsp; Please point me to the appropriate documentation.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Provisiong a 9160 on our AWS VPC</title><link>https://devzone.nordicsemi.com/thread/520959?ContentTypeID=1</link><pubDate>Sat, 01 Feb 2025 06:49:43 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:9a242c7d-8a07-4fb5-9067-d71bc3ac8efd</guid><dc:creator>Achim Kraus</dc:creator><description>&lt;p&gt;At least in mfw 1.3.7, the credentials in &lt;a href="https://docs.nordicsemi.com/bundle/ref_at_commands/page/REF/at_commands/security/cmng_set.html"&gt;AT%CMNG&lt;/a&gt; are organized in &amp;quot;sec_tag&amp;quot; and &amp;quot;type&amp;quot;.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;AT%CMNG=0,16842753,0,&amp;quot;-----BEGIN CERTIFICATE-----...&amp;quot;&lt;/li&gt;
&lt;li&gt;AT%CMNG=0,16842754,0,&amp;quot;-----BEGIN RSA PRIVATE KEY-----...&amp;quot;&lt;/li&gt;
&lt;li&gt;AT%CMNG=0,16842755,0,&amp;quot;-----BEGIN CERTIFICATE-----...&amp;quot;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;writes to type 0 =&amp;gt; &amp;quot;root ca&amp;quot; to several &amp;quot;sec_tag&amp;quot;. No idea, where this was found.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;AT%CMNG=0,16842753,2,&amp;quot;-----BEGIN CERTIFICATE-----...&amp;quot;&lt;/li&gt;
&lt;li&gt;AT%CMNG=0,16842753,1,&amp;quot;-----BEGIN RSA PRIVATE KEY-----...&amp;quot;&lt;/li&gt;
&lt;li&gt;AT%CMNG=0,16842753,0,&amp;quot;-----BEGIN CERTIFICATE-----...&amp;quot;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;(assuming the 1. entry of type 2 sets the client certificate, and the 3. of type 0 the trusted server certificate root).&lt;/p&gt;
&lt;p&gt;Anyway, please read the documentation and use the samples to start with.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>