Setting up
Before you use Device Advisor for the first time, complete the following tasks:
Create an IoT thing
First, create an IoT thing and attach a certificate to that thing. For a tutorial on how to create things, see Create a thing object.
Create an IAM role to use as your device role
Note
You can quickly create the device role with the Device Advisor console. To learn how
to set up your device role with the Device Advisor console, see Getting started with the Device Advisor in the console
-
Go to the Amazon Identity and Access Management console
and log in to the Amazon Web Services account you use for Device Advisor testing. -
In the left navigation pane, chose Policies.
-
Choose Create policy.
-
Under Create policy, do the following:
-
For Service, choose IoT.
-
Under Actions, do one of the following:
-
(Recommended) Select actions based on the policy attached to the IoT thing or certificate you created in the previous section.
-
Search for the following actions in the Filter action box and select them:
-
Connect
-
Publish
-
Subscribe
-
Receive
-
RetainPublish
-
-
-
Under Resources, restrict the client, topic, and topic resources. Restricting these resources is a security best practice. To restrict resources, do the following:
-
Choose Specify client resource ARN for the Connect action.
-
Choose Add ARN, then do either of the following:
Note
The clientId is the MQTT client ID that your device uses to interact with Device Advisor.
-
Specify the Region, accountID, and clientID in the visual ARN editor.
-
Manually enter the Amazon Resource Names (ARNs) of the IoT topics you want to run your test cases with.
-
-
Choose Add.
-
Choose Specify topic resource ARN for the Receive and one more action.
-
Choose Add ARN, then do either of the following:
Note
The topic name is the MQTT topic that your device publishes messages to.
-
Specify the Region, accountID, and Topic name in the visual ARN editor.
-
Manually enter the ARNs of the IoT topics you want to run your test cases with.
-
-
Choose Add.
-
Choose Specify topicFilter resource ARN for the Subscribe action.
-
Choose Add ARN, then do either of the following:
Note
The topic name is the MQTT topic that your device subscribes to.
-
Specify the Region, accountID, and Topic name in the visual ARN editor.
-
Manually enter the ARNs of the IoT topics you want to run your test cases with.
-
-
Choose Add.
-
-
-
Choose Next: Tags.
-
Choose Next: Review.
-
Under Review policy, enter a Name for your policy.
-
Choose Create policy.
-
On the left navigation pane, Choose Roles.
-
Choose Create Role.
-
Under Select trusted entity, choose Custom trust policy.
-
Enter the following trust policy into the Custom trust policy box. To protect against the confused deputy problem, add the global condition context keys
aws:SourceArn
andaws:SourceAccount
to the policy.Important
Your
aws:SourceArn
must comply with theformat: arn:aws:iotdeviceadvisor:
Make sure thatregion:account-id
:*.
matches your Amazon IoT Region andregion
matches your customer account ID. For more information, see Cross-service confused deputy prevention.account-id
{ "Version": "2012-10-17", "Statement": [ { "Sid": "AllowAwsIoTCoreDeviceAdvisor", "Effect": "Allow", "Principal": { "Service": "iotdeviceadvisor.amazonaws.com" }, "Action": "sts:AssumeRole", "Condition": { "StringEquals": { "aws:SourceAccount": "111122223333" }, "ArnLike": { "aws:SourceArn": "arn:aws:iotdeviceadvisor:*:111122223333:suitedefinition/*" } } } ] }
-
Choose Next.
-
Choose the policy you created in Step 4.
-
(Optional) Under Set permissions boundary, choose Use a permissions boundary to control the maximum role permissions, and then select the policy you created.
-
Choose Next.
-
Enter a Role name and a Role description.
-
Choose Create role.
Create a custom-managed policy for an IAM user to use Device Advisor
-
Navigate to the IAM console at https://console.amazonaws.cn/iam/
. If prompted, enter your Amazon credentials to sign in. -
In the left navigation pane, choose Policies.
-
Choose Create Policy, then choose the JSON tab.
-
Add the necessary permissions to use Device Advisor. The policy document can be found in the topic Security best practices.
-
Choose Review Policy.
-
Enter a Name and Description.
-
Choose Create Policy.
Create an IAM user to use Device Advisor
Note
We recommend that you create an IAM user to use when you run Device Advisor tests. Running Device Advisor tests from an admin user can pose security risks and isn't recommended.
-
Navigate to the IAM console at https://console.amazonaws.cn/iam/
If prompted, enter your Amazon credentials to sign in. -
In the left navigation pane, Choose Users.
-
Choose Add User.
-
Enter a User name.
-
Users need programmatic access if they want to interact with Amazon outside of the Amazon Web Services Management Console. The Amazon APIs and the Amazon Command Line Interface require access keys. Whenever possible, create temporary credentials that consist of an access key ID, a secret access key, and a security token that indicates when the credentials expire.
To grant users programmatic access, choose one of the following options.
Which user needs programmatic access? To By IAM Use short-term credentials to sign programmatic requests to the Amazon CLI or Amazon APIs (directly or by using the Amazon SDKs). Following the instructions in Using temporary credentials with Amazon resources in the IAM User Guide. IAM (Not recommended)
Use long-term credentials to sign programmatic requests to the Amazon CLI or Amazon APIs (directly or by using the Amazon SDKs).Following the instructions in Managing access keys for IAM users in the IAM User Guide. -
Choose Next: Permissions.
-
To provide access, add permissions to your users, groups, or roles:
-
Users managed in IAM through an identity provider:
Create a role for identity federation. Follow the instructions in Create a role for a third-party identity provider (federation) in the IAM User Guide.
-
IAM users:
-
Create a role that your user can assume. Follow the instructions in Create a role for an IAM user in the IAM User Guide.
-
(Not recommended) Attach a policy directly to a user or add a user to a user group. Follow the instructions in Adding permissions to a user (console) in the IAM User Guide.
-
-
-
Enter the name of the custom-managed policy that you created in the search box. Then, select the check box for Policy name.
-
Choose Next: Tags.
-
Choose Next: Review.
-
Choose Create user.
-
Choose Close.
Device Advisor requires access to your Amazon resources (things, certificates, and endpoints) on your behalf. Your IAM user must have the necessary permissions. Device Advisor will also publish logs to Amazon CloudWatch if you attach the necessary permissions policy to your IAM user.
Configure your device
Device Advisor uses the server name indication (SNI) TLS extension to apply TLS configurations. Devices must use this extension when they connect and pass a server name that is identical to the Device Advisor test endpoint.
Device Advisor allows the TLS connection when a test is in the Running
state. It denies the TLS connection before and after each test run. For this reason,
we recommend that you use the device connect retry mechanism for a fully automated
testing experience with Device Advisor. You can run test suites that include more than one
test case, such as TLS connect, MQTT connect, and MQTT publish. If you run multiple
test cases, we recommend that your device try to connect to our test endpoint every
five seconds. You can then automate running multiple test cases in sequence.
Note
To ready your device software for testing, we recommend that you use an SDK that can connect to Amazon IoT Core. You should then update the SDK with the Device Advisor test endpoint provided for your Amazon Web Services account.
Device Advisor supports two types of endpoints: Account-level and Device-level endpoints. Choose the endpoint that best fits your use case. To simultaneously run multiple test suites for different devices, use a Device-level endpoint.
Run the following command to get the Device-level endpoint:
For MQTT customers using X.509 client certificates:
aws iotdeviceadvisor get-endpoint --thing-arn
your-thing-arn
or
aws iotdeviceadvisor get-endpoint --certificate-arn
your-certificate-arn
For MQTT over WebSocket customers using Signature Version 4:
aws iotdeviceadvisor get-endpoint --device-role-arn
your-device-role-arn
--authentication-method SignatureVersion4
To run one test suite at a time, choose an Account-level endpoint. Run the following command to get the Account-level endpoint:
aws iotdeviceadvisor get-endpoint