Certificate based authentication
ClearBlade IoT Enterprise supports public key (asymmetric) and mTLS device authentication types.
Public key (asymmetric) authentication
A device must create a private/public key pair. The private key is only left local on the device, while the public key is uploaded to the ClearBlade IoT Enterprise system’s device record.
See Creating key pairs to create the key pair.
To authenticate, the device will construct a JSON Web Token (JWT) based on the private key and present that on the MQTT authentication or REST endpoint’s connect packet. The JWT is used in place of the standard ClearBlade auth token.
The device uses the private key to sign the JWT. The token is passed to ClearBlade IoT Core as proof of the device's identity.
The service uses the device’s public key (uploaded before the JWT is sent) to verify the device's identity.
To add the public key to the device, use the following steps and example images:
Find the device in the system’s device table:
Right-click the device’s gear icon and choose Public Keys, then click the Add button:
Pick the appropriate key format:
ClearBlade IoT Core supports the RSA and elliptic curve algorithms. For details on key formats, see Public key format.
Claims
ClearBlade IoT Enterprise requires these reserved claim fields. They may appear in any order in the claim set.
Name | Description | Required for |
---|---|---|
| Issued at: The timestamp when the token was created, specified as seconds since 00:00:00 UTC, January 1, 1970. The server may report an error if this timestamp is too far in the past or future (allowing 10 minutes for skew). | MQTT, HTTP |
| Expiration: The timestamp when the token stops being valid, specified as seconds since 00:00:00 UTC, January 1, 1970. The token’s maximum lifetime is 24 hours + skew.
| MQTT, HTTP |
| System key: This must be a single string containing the ClearBlade registry’s system key. This can be obtained by clicking the API keys button at the top-right of the ClearBlade Registry Details page. | MQTT, HTTP |
| User ID: This must be a single string containing the deviceId. | MQTT, HTTP |
| User type: This must be an integer hard-coded to value 3. | MQTT, HTTP |
The optional nbf
(not before) claim will be ignored.
A JSON representation of the required reserved fields in a ClearBlade IoT Core JWT claim set is shown below:
{
"aud": "my-project",
"iat": 1509654401,
"exp": 1612893233
}
Only devices will be supported with this method.
Client type | Client ID | Username field | Password field |
---|---|---|---|
New ClearBlade client via JWT | Anything | -unused- | JWT token with sk, uid, and ut claims |
Each time the client sends an MQTT message (including PINGREQ), the ClearBlade MQTT Broker checks the exp. If the current time is later than exp + 10m then the client will disconnected. The 10 minutes is to allow for time skew between client and server.
The Python file shows an example of generating a JWT for the MQTT client’s password.
mTLS
Devices may connect using an mTLS approach to gain their access token. ClearBlade handles mTLS auth and TLS termination.
The mTLS configuration will be valid for all systems running in the IoT Enterprise instance.
Currently, no user interface administration is available to manage the loaded certificates. All certificates must be loaded to the server via API calls.
Requirements
The device name must be the cn (common name) in the cert presented. The platform verifies that the certificate passed in is for the device.
APIs
/admin/settings/mtls
GET, PUT (upsert), and DELETE support. Admin only.
PUT:
Body required:
{"root_ca": "certificate in PEM format. <required>", "crl": "certificate revocation list in PEM format. <optional>"}
Returns nil on success
GET:
No query support. Get the latest mTLS settings in JSON:
{"root_ca": "certificate in PEM format", "crl": "certificate revocation list in PEM format"}
DELETE:
No query support. Deletes mTLS settings.
/admin/revoked_certs
GET, POST, and DELETE support. Admin only.
POST:
Use to revoke a certificate. Body required:
Returns nil on success.
GET:
Query supported. An empty query gets all revoked certificates, including those that match the query.
DELETE:
Query supported. An empty query deletes all revoked certificates and returns nil on success.
Authentication
A device can authenticate (i.e., receive a token) using mTLS by sending an HTTP POST request to port 444 of the relevant URL.
The following curl can be used as an example:curl -X POST "https://yourURL.com:444/api/v/4/devices/mtls/auth" -H 'Content-Type: application/json' -H 'Accept: application/json' -d '{"system_key": "yourSystemKey", "name": "yourDeviceName"}' --cert "path/to/yourDeviceCert.pem" --key "path/to/yourDeviceKey.pem"
The returned response will contain a device token.
Similarly, this Python code can be used as an example:
ALPN (Application Layer Protocol Negotiation)
ClearBlade supports mTLS authentication for devices connecting via MQTT using ALPN on port 444. The ALPN protocol name is clearblade_mqtt_mtls
. Device Just-in-Time (JIT) provisioning is also supported. A Root CA certificate must be added via the mTLS admin endpoints before connecting devices via mTLS.
To connect to MQTT using mTLS, the device needs to set the following in the MQTT Connect packet:
The Username field must be a stringified JSON object with the device name set, amongst other column values, if required for JIT provisioning. For example:
'{"name": "myDevice"}'
The Password field must contain the system key.
Here’s a Python example using the Paho MQTT client: