Skip to content
English
  • There are no suggestions because the search field is empty.

TLS/mTLS Certificates for Wavelet Connectivity (MQTT and HTTPS)

Wavelets running the RED Support firmware branch support TLS and mTLS for both MQTT and HTTPS. This article explains which certificates are used, where they are installed (Wavelet vs server), and who can sign them (Ayyeka or the customer), including the per-device CSR process for mTLS.

What certificates exist (and where they live)

Mode Wavelet (device) stores Server (MQTT/HTTPS) stores
One-way TLS (server-authenticated) Server CA certificate (trust anchor) Server certificate + private key
mTLS (mutual TLS) Device certificate + private key, Server CA certificate (trust anchor) Server certificate + private key, Device CA certificate (trust anchor)

Clarifications (CA vs cert, keys)

Term What it means Who holds the private key
Server CA CA that signs the server certificate; Wavelet trusts this CA to validate the server CA owner only (never shared)
Server certificate Identity certificate presented by the MQTT/HTTPS server Server/broker only
Device CA CA that signs device (client) certificates; server trusts this CA to validate devices CA owner only (never shared)
Device certificate (mTLS) Per-device client certificate presented by the Wavelet Wavelet/device only

Notes:

  • CA private keys are never shared. Only CA public certificates are distributed.

  • The Wavelet private key remains on the device and is not shared.

Who signs which certificates (Ayyeka vs Customer)

Rule: the owner of the CA signs certificates issued under that CA.

Server CA owner (signs server cert) Device CA owner (signs device certs) Typical fit
Customer Customer Customer owns full PKI (most control)
Customer Ayyeka Customer controls server identity; Ayyeka manages device PKI
Ayyeka Customer Less common; customer manages device PKI
Ayyeka Ayyeka Fastest for Ayyeka; usually less desired by customers

Per-device certificate issuance (CSR flow) for mTLS

  1. Ayyeka flashes devices with RED Support firmware and generates a CSR per device (via AKG).

  2. Ayyeka sends the per-device CSRs to the Device CA owner (Customer or Ayyeka, depending on the selected model).

  3. Device CA owner signs the CSRs and returns the signed device certificates (and chain if applicable).

  4. Ayyeka provisions the signed device certificates onto the matching devices and continues manufacturing/shipping.

Server-side requirement to enable mTLS

To enable mTLS, the server (MQTT broker / HTTPS server) must be configured to:

  • Present its server certificate, and

  • Require a client certificate and trust the Device CA certificate.