Skip to content

Conversation

@id
Copy link
Collaborator

@id id commented Nov 17, 2025

No description provided.

@id id added this to the 6.1.0 milestone Nov 17, 2025
@id id force-pushed the 20251117-aws-iot-migration-guide branch from 2da27e5 to 83e3912 Compare November 17, 2025 16:12
@id id force-pushed the 20251117-aws-iot-migration-guide branch from acba3ad to 560f759 Compare November 18, 2025 08:05

Regardless of the method, the certificate hierarchy is the same: your devices are always signed by your own CA. For migration to EMQX, you must obtain this CA certificate so EMQX can verify your devices.

### Identify the CA That Issued Your Device Certificates
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@id, I added this section to show exactly users can locate the CA. Please help to review.

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good!

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@Meggielqk I cannot formally approve the PR because I created it. If you think it looks good, let's merge it.

thalesmg
thalesmg previously approved these changes Nov 24, 2025
| **Device Certificate** | `device-001.cert.pem` | `device-001.cert.pem` | No change. The device continues using its existing certificate signed by your CA. |
| **Device Private Key** | `device-001.key.pem` | `device-001.key.pem` | No change. The device continues using its existing private key. |
| **Server Verification** (Device trusts Server) | Device client uses `AmazonRootCA1.pem` | Device client must be updated to use `emqx-server-ca.pem` | The client must trust the CA that issued the EMQX server's certificate. |
| **Client Verification** (Server trusts Device) | AWS IoT Core trusts your registered CA | EMQX listener's `cacertfile` must be set to `your-ca.pem` | EMQX must be configured to trust the same CA you registered with AWS IoT Core.|
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think it's worth mentioning that verify = verify_peer must be set in addition to configuring the CA cert file.


| **Parameter** | **AWS IoT Core (Example)** | **EMQX (Example)** | **Notes** |
| ------------- | -------------------------- | ------------------ | --------- |
| **Endpoint Hostname** | `agwba84cbf2pn-ats.iot.eu-west-1.amazonaws.com` | `mqtt.example.com` | Update device client code/firmware |
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Probably they'll need to specify the port as well. IIRC, AWS IoT SDK defaults to 443 when using WSS, at least.
It does seem to default to 8883 when not using websockets, indeed.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants