/
Client certificate management
Client certificate management
Question
Must individual client certificates be imported in HiveMQ's truststore?
Answer
In production, we recommend using client and server certificates that are signed by a trusted CA or the internal CA of your company.
To create individual client certificates for IoT devices, create an intermediary from your ROOT CA and sign individual certificates with this intermediary.
Make sure that clients present the entire certificate chain on connection, this way, you only need to include your ROOT certificate in the HiveMQ truststore.
See this article.
Related content
How To Generate Client Certificates for TLS Clients
How To Generate Client Certificates for TLS Clients
More like this
Creating self-signed server- and client certificates with Root CA intermediate certificates.
Creating self-signed server- and client certificates with Root CA intermediate certificates.
Read with this
How to enable multiple client certificates on a Cloud Starter cluster for authentication
How to enable multiple client certificates on a Cloud Starter cluster for authentication
More like this
How to configure ESE to authenticate clients using client certificates and authorize using postgresSQL(without username/password)
How to configure ESE to authenticate clients using client certificates and authorize using postgresSQL(without username/password)
More like this
How to configure ESE to use Certificates Authentication
How to configure ESE to use Certificates Authentication
More like this
Obtaining SSL debugging information
Obtaining SSL debugging information
Read with this