FIPS endpoints
AWS IoT Greengrass supports the use of FIPS (Federal Information Processing Standard (FIPS) 140-2
MQTT communications to AWS IoT utilize the IoT dataplane FIPS endpoint (Connecting to AWS IoT FIPS endpoints - AWS IoT Core) and the AWS-developed FIPS-compliant cryptographic library aws-lc.
For HTTP communications in Greengrass:
-
For nucleus and plugin components, all SDK HTTP clients are configured with FIPS endpoints by setting the system property AWS_USE_FIPS_ENDPOINT to true;
-
For generic components, all components start with the system property AWS_USE_FIPS_ENDPOINT set to true. This process ensures that the SDK HTTP clients used by these generic components send requests to FIPS-compliant endpoints.
Note
In the case of Stream manager, Nucleus passes the environment variable AWS_GG_FIPS_MODE. This environment variable allows the HTTP clients utilized within the Stream Manager to identify and connect to the corresponding FIPS-compliant endpoint.
AWS IoT Greengrass offers two methods to enable FIPS mode: provisioning and deployment. To activate the
FIPS mode, you have to set the configuration parameter fipsMode
to true,
Nucleus then sets the system property AWS_USE_FIPS_ENDPOINT to true and propagate it as an
environment variable to all other components. Additionally, AWS IoT Greengrass will download a root CA
certificate (CA3) and append it to the existing rootCA.pem (or AmazonRootCA1.pem) file. If
you enable FIPS through a new deployment, Nucleus will restart to ensure that the system
property takes effect after enabling FIPS mode.
Apart from configuring the fipsMode
parameter, you must also configure the
iotDataEndpoint
, iotCredEndpoint
and
greengrassDataEndpoint
parameters. For more information, see the relevant
document below.
Enable FIPS endpoints with deployment
Get the AWS IoT endpoints for your AWS account, and save them to use later. Your
device uses these endpoints to connect to AWS IoT. There are two endpoints required, the
iotDataEndpoint
and the iotCredEndpoint
. Do the
following:
-
Get the FIPS data endpoint for your region in the AWS IoT Core FIPS data plane endpoints. The FIPS data endpoint for your AWS account should look like this:
data.iot-fips.us-west-2.amazonaws.com
-
Get the FIPS credentials endpoint for your region in the AWS IoT Core FIPS data plane endpoints. The FIPS credentials endpoint for your AWS account should look like this:
data.credentials.iot-fips.us-west-2.amazonaws.com
Then, to enable FIPS with a deployment, you need to apply the following configuration to Nucleus. The configuration to merge on the deployment is as follows.
Install Nucleus with FIPS endpoints with manual resource provisioning
Manually provision AWS resources for AWS IoT Greengrass V2 core devices with FIPS endpoints
Important
Before you download the AWS IoT Greengrass Core software, check that your core device meets the requirements to install and run the AWS IoT Greengrass Core software v2.0.
Topics
Retrieve AWS IoT endpoints
Get the AWS IoT endpoints for your AWS account, and save them to use later. Your
device uses these endpoints to connect to AWS IoT. There are two endpoints required,
the iotDataEndpoint
and the iotCredEndpoint
. Do the
following:
-
Get the FIPS data endpoint for your region in the AWS IoT Core FIPS data plane endpoints. The FIPS data endpoint for your AWS account should look like this:
data.iot-fips.us-west-2.amazonaws.com
-
Get the FIPS credentials endpoint for your region in the AWS IoT Core FIPS data plane endpoints. The FIPS credentials endpoint for your AWS account should look like this:
data.credentials.iot-fips.us-west-2.amazonaws.com
Create an AWS IoT thing
AWS IoT things represent devices and logical entities that connect to AWS IoT. Greengrass core devices are AWS IoT things. When you register a device as an AWS IoT thing, that device can use a digital certificate to authenticate with AWS.
In this section, you create an AWS IoT thing that represents your device.
To create an AWS IoT thing
-
Create an AWS IoT thing for your device. On your development computer, run the following command.
-
Replace
MyGreengrassCore
with the thing name to use. This name is also the name of your Greengrass core device.Note
The thing name can't contain colon (
:
) characters.
aws iot create-thing --thing-name
MyGreengrassCore
The response looks similar to the following example, if the request succeeds.
{ "thingName": "MyGreengrassCore", "thingArn": "arn:aws:iot:us-west-2:123456789012:thing/MyGreengrassCore", "thingId": "8cb4b6cd-268e-495d-b5b9-1713d71dbf42" }
-
-
(Optional) Add the AWS IoT thing to a new or existing thing group. You use thing groups to manage fleets of Greengrass core devices. When you deploy software components to your devices, you can target individual devices or groups of devices. You can add a device to a thing group with an active Greengrass deployment to deploy that thing group's software components to the device. Do the following:
-
(Optional) Create an AWS IoT thing group.
-
Replace
MyGreengrassCoreGroup
with the name of the thing group to create.Note
The thing group name can't contain colon (
:
) characters.
aws iot create-thing-group --thing-group-name
MyGreengrassCoreGroup
The response looks similar to the following example, if the request succeeds.
{ "thingGroupName": "MyGreengrassCoreGroup", "thingGroupArn": "arn:aws:iot:us-west-2:123456789012:thinggroup/MyGreengrassCoreGroup", "thingGroupId": "4df721e1-ff9f-4f97-92dd-02db4e3f03aa" }
-
-
Add the AWS IoT thing to a thing group.
-
Replace
MyGreengrassCore
with the name of your AWS IoT thing. -
Replace
MyGreengrassCoreGroup
with the name of the thing group.
aws iot add-thing-to-thing-group --thing-name
MyGreengrassCore
--thing-group-nameMyGreengrassCoreGroup
The command doesn't have any output if the request succeeds.
-
-
Create the thing certificate
When you register a device as an AWS IoT thing, that device can use a digital certificate to authenticate with AWS. This certificate allows the device to communicate with AWS IoT and AWS IoT Greengrass.
In this section, you create and download certificates that your device can use to connect to AWS.
If you want to configure the AWS IoT Greengrass Core software to use a hardware security module (HSM) to securely store the private key and certificate, follow the steps to create the certificate from a private key in an HSM. Otherwise, follow the steps to create the certificate and private key in the AWS IoT service. The hardware security feature is available on Linux devices only. For more information about hardware security and requirements to use it, see Hardware security integration.
Create the certificate and private key in the AWS IoT service
To create the thing certificate
-
Create a folder where you download the certificates for the AWS IoT thing.
mkdir greengrass-v2-certs
-
Create and download the certificates for the AWS IoT thing.
aws iot create-keys-and-certificate --set-as-active --certificate-pem-outfile greengrass-v2-certs/device.pem.crt --public-key-outfile greengrass-v2-certs/public.pem.key --private-key-outfile greengrass-v2-certs/private.pem.key
The response looks similar to the following example, if the request succeeds.
{ "certificateArn": "arn:aws:iot:us-west-2:123456789012:cert/aa0b7958770878eabe251d8a7ddd547f4889c524c9b574ab9fbf65f32248b1d4", "certificateId": "aa0b7958770878eabe251d8a7ddd547f4889c524c9b574ab9fbf65f32248b1d4", "certificatePem": "-----BEGIN CERTIFICATE----- MIICiTCCAfICCQD6m7oRw0uXOjANBgkqhkiG9w 0BAQUFADCBiDELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAldBMRAwDgYDVQQHEwdTZ WF0dGxlMQ8wDQYDVQQKEwZBbWF6b24xFDASBgNVBAsTC0lBTSBDb25zb2xlMRIw EAYDVQQDEwlUZXN0Q2lsYWMxHzAdBgkqhkiG9w0BCQEWEG5vb25lQGFtYXpvbi5 jb20wHhcNMTEwNDI1MjA0NTIxWhcNMTIwNDI0MjA0NTIxWjCBiDELMAkGA1UEBh MCVVMxCzAJBgNVBAgTAldBMRAwDgYDVQQHEwdTZWF0dGxlMQ8wDQYDVQQKEwZBb WF6b24xFDASBgNVBAsTC0lBTSBDb25zb2xlMRIwEAYDVQQDEwlUZXN0Q2lsYWMx HzAdBgkqhkiG9w0BCQEWEG5vb25lQGFtYXpvbi5jb20wgZ8wDQYJKoZIhvcNAQE BBQADgY0AMIGJAoGBAMaK0dn+a4GmWIWJ21uUSfwfEvySWtC2XADZ4nB+BLYgVI k60CpiwsZ3G93vUEIO3IyNoH/f0wYK8m9TrDHudUZg3qX4waLG5M43q7Wgc/MbQ ITxOUSQv7c7ugFFDzQGBzZswY6786m86gpEIbb3OhjZnzcvQAaRHhdlQWIMm2nr AgMBAAEwDQYJKoZIhvcNAQEFBQADgYEAtCu4nUhVVxYUntneD9+h8Mg9q6q+auN KyExzyLwaxlAoo7TJHidbtS4J5iNmZgXL0FkbFFBjvSfpJIlJ00zbhNYS5f6Guo EDmFJl0ZxBHjJnyp378OD8uTs7fLvjx79LjSTbNYiytVbZPQUQ5Yaxu2jXnimvw 3rrszlaEXAMPLE= -----END CERTIFICATE-----", "keyPair": { "PublicKey": "-----BEGIN PUBLIC KEY-----\ MIIBIjANBgkqhkEXAMPLEQEFAAOCAQ8AMIIBCgKCAQEAEXAMPLE1nnyJwKSMHw4h\ MMEXAMPLEuuN/dMAS3fyce8DW/4+EXAMPLEyjmoF/YVF/gHr99VEEXAMPLE5VF13\ 59VK7cEXAMPLE67GK+y+jikqXOgHh/xJTwo+sGpWEXAMPLEDz18xOd2ka4tCzuWEXAMPLEahJbYkCPUBSU8opVkR7qkEXAMPLE1DR6sx2HocliOOLtu6Fkw91swQWEXAMPLE\\GB3ZPrNh0PzQYvjUStZeccyNCx2EXAMPLEvp9mQOUXP6plfgxwKRX2fEXAMPLEDa\ hJLXkX3rHU2xbxJSq7D+XEXAMPLEcw+LyFhI5mgFRl88eGdsAEXAMPLElnI9EesG\ FQIDAQAB\ -----END PUBLIC KEY-----\ ", "PrivateKey": "-----BEGIN RSA PRIVATE KEY-----\ key omitted for security reasons\ -----END RSA PRIVATE KEY-----\ " } }
Save the certificate's Amazon Resource Name (ARN) to use to configure the certificate later.
Create the certificate from a private key in an HSM
Note
This feature is available for v2.5.3 and later of the Greengrass nucleus component. AWS IoT Greengrass doesn't currently support this feature on Windows core devices.
To create the thing certificate
-
On the core device, initialize a PKCS#11 token in the HSM, and generate a private key. The private key must be an RSA key with an RSA-2048 key size (or larger) or an ECC key.
Note
To use a hardware security module with ECC keys, you must use Greengrass nucleus v2.5.6 or later.
To use a hardware security module and secret manager, you must use a hardware security module with RSA keys.
Check the documentation for your HSM to learn how to initialize the token and generate the private key. If your HSM supports object IDs, specify an object ID when you generate the private key. Save the slot ID, user PIN, object label, object ID (if your HSM uses one) that you specify when you initialize the token and generate the private key. You use these values later when you import the thing certificate to the HSM and configure the AWS IoT Greengrass Core software.
-
Create a certificate signing request (CSR) from the private key. AWS IoT uses this CSR to create a thing certificate for the private key that you generated in the HSM. For information about how to create a CSR from the private key, see the documentation for your HSM. The CSR is a file, such as
iotdevicekey.csr
. -
Copy the CSR from the device to your development computer. If SSH and SCP are enabled on the development computer and the device, you can use the
scp
command on your development computer to transfer the CSR. Replacedevice-ip-address
with the IP address of your device, and replace~/iotdevicekey.csr
with the path to the CSR file on the device.scp
device-ip-address
:~/iotdevicekey.csr
iotdevicekey.csr -
On your development computer, create a folder where you download the certificate for the AWS IoT thing.
mkdir greengrass-v2-certs
-
Use the CSR file to create and download the certificate for the AWS IoT thing to your development computer.
aws iot create-certificate-from-csr --set-as-active --certificate-signing-request=file://iotdevicekey.csr --certificate-pem-outfile greengrass-v2-certs/device.pem.crt
The response looks similar to the following example, if the request succeeds.
{ "certificateArn": "arn:aws:iot:us-west-2:123456789012:cert/aa0b7958770878eabe251d8a7ddd547f4889c524c9b574ab9fbf65f32248b1d4", "certificateId": "aa0b7958770878eabe251d8a7ddd547f4889c524c9b574ab9fbf65f32248b1d4", "certificatePem": "-----BEGIN CERTIFICATE----- MIICiTCCAfICCQD6m7oRw0uXOjANBgkqhkiG9w 0BAQUFADCBiDELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAldBMRAwDgYDVQQHEwdTZ WF0dGxlMQ8wDQYDVQQKEwZBbWF6b24xFDASBgNVBAsTC0lBTSBDb25zb2xlMRIw EAYDVQQDEwlUZXN0Q2lsYWMxHzAdBgkqhkiG9w0BCQEWEG5vb25lQGFtYXpvbi5 jb20wHhcNMTEwNDI1MjA0NTIxWhcNMTIwNDI0MjA0NTIxWjCBiDELMAkGA1UEBh MCVVMxCzAJBgNVBAgTAldBMRAwDgYDVQQHEwdTZWF0dGxlMQ8wDQYDVQQKEwZBb WF6b24xFDASBgNVBAsTC0lBTSBDb25zb2xlMRIwEAYDVQQDEwlUZXN0Q2lsYWMx HzAdBgkqhkiG9w0BCQEWEG5vb25lQGFtYXpvbi5jb20wgZ8wDQYJKoZIhvcNAQE BBQADgY0AMIGJAoGBAMaK0dn+a4GmWIWJ21uUSfwfEvySWtC2XADZ4nB+BLYgVI k60CpiwsZ3G93vUEIO3IyNoH/f0wYK8m9TrDHudUZg3qX4waLG5M43q7Wgc/MbQ ITxOUSQv7c7ugFFDzQGBzZswY6786m86gpEIbb3OhjZnzcvQAaRHhdlQWIMm2nr AgMBAAEwDQYJKoZIhvcNAQEFBQADgYEAtCu4nUhVVxYUntneD9+h8Mg9q6q+auN KyExzyLwaxlAoo7TJHidbtS4J5iNmZgXL0FkbFFBjvSfpJIlJ00zbhNYS5f6Guo EDmFJl0ZxBHjJnyp378OD8uTs7fLvjx79LjSTbNYiytVbZPQUQ5Yaxu2jXnimvw 3rrszlaEXAMPLE= -----END CERTIFICATE-----" }
Save the certificate's ARN to use to configure the certificate later.
Configure the thing certificate
Attach the thing certificate to the AWS IoT thing that you created earlier, and add an AWS IoT policy to the certificate to define the AWS IoT permissions for the core device.
To configure the thing's certificate
-
Attach the certificate to the AWS IoT thing.
-
Replace
MyGreengrassCore
with the name of your AWS IoT thing. -
Replace the certificate Amazon Resource Name (ARN) with the ARN of the certificate that you created in the previous step.
aws iot attach-thing-principal --thing-name
MyGreengrassCore
--principalarn:aws:iot:us-west-2:123456789012:cert/aa0b7958770878eabe251d8a7ddd547f4889c524c9b574ab9fbf65f32248b1d4
The command doesn't have any output if the request succeeds.
-
-
Create and attach an AWS IoT policy that defines the AWS IoT permissions for your Greengrass core device. The following policy allows access to all MQTT topics and Greengrass operations, so your device works with custom applications and future changes that require new Greengrass operations. You can restrict this policy down based on your use case. For more information, see Minimal AWS IoT policy for AWS IoT Greengrass V2 core devices.
If you have set up a Greengrass core device before, you can attach its AWS IoT policy instead of creating a new one.
Do the following:
-
Create a file that contains the AWS IoT policy document that Greengrass core devices require.
For example, on a Linux-based system, you can run the following command to use GNU nano to create the file.
nano greengrass-v2-iot-policy.json
Copy the following JSON into the file.
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "iot:Publish", "iot:Subscribe", "iot:Receive", "iot:Connect", "greengrass:*" ], "Resource": [ "*" ] } ] }
-
Create an AWS IoT policy from the policy document.
-
Replace
GreengrassV2IoTThingPolicy
with the name of the policy to create.
aws iot create-policy --policy-name
GreengrassV2IoTThingPolicy
--policy-document file://greengrass-v2-iot-policy.jsonThe response looks similar to the following example, if the request succeeds.
{ "policyName": "GreengrassV2IoTThingPolicy", "policyArn": "arn:aws:iot:us-west-2:123456789012:policy/GreengrassV2IoTThingPolicy", "policyDocument": "{ \\"Version\\": \\"2012-10-17\\", \\"Statement\\": [ { \\"Effect\\": \\"Allow\\", \\"Action\\": [ \\"iot:Publish\\", \\"iot:Subscribe\\", \\"iot:Receive\\", \\"iot:Connect\\", \\"greengrass:*\\" ], \\"Resource\\": [ \\"*\\" ] } ] }", "policyVersionId": "1" }
-
-
Attach the AWS IoT policy to the AWS IoT thing's certificate.
-
Replace
GreengrassV2IoTThingPolicy
with the name of the policy to attach. -
Replace the target ARN with the ARN of the certificate for your AWS IoT thing.
aws iot attach-policy --policy-name
GreengrassV2IoTThingPolicy
--targetarn:aws:iot:us-west-2:123456789012:cert/aa0b7958770878eabe251d8a7ddd547f4889c524c9b574ab9fbf65f32248b1d4
The command doesn't have any output if the request succeeds.
-
-
Create a token exchange role
Greengrass core devices use an IAM service role, called the token exchange role, to authorize calls to AWS services. The device uses the AWS IoT credentials provider to get temporary AWS credentials for this role, which allows the device to interact with AWS IoT, send logs to Amazon CloudWatch Logs, and download custom component artifacts from Amazon S3. For more information, see Authorize core devices to interact with AWS services.
You use an AWS IoT role alias to configure the token exchange role for Greengrass core devices. Role aliases enable you to change the token exchange role for a device but keep the device configuration the same. For more information, see Authorizing direct calls to AWS services in the AWS IoT Core Developer Guide.
In this section, you create a token exchange IAM role and an AWS IoT role alias that points to the role. If you have already set up a Greengrass core device, you can use its token exchange role and role alias instead of creating new ones. Then, you configure your device's AWS IoT thing to use that role and alias.
To create a token exchange IAM role
-
Create an IAM role that your device can use as a token exchange role. Do the following:
-
Create a file that contains the trust policy document that the token exchange role requires.
For example, on a Linux-based system, you can run the following command to use GNU nano to create the file.
nano device-role-trust-policy.json
Copy the following JSON into the file.
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "Service": "credentials.iot.amazonaws.com" }, "Action": "sts:AssumeRole" } ] }
-
Create the token exchange role with the trust policy document.
-
Replace
GreengrassV2TokenExchangeRole
with the name of the IAM role to create.
aws iam create-role --role-name
GreengrassV2TokenExchangeRole
--assume-role-policy-document file://device-role-trust-policy.jsonThe response looks similar to the following example, if the request succeeds.
{ "Role": { "Path": "/", "RoleName": "GreengrassV2TokenExchangeRole", "RoleId": "AROAZ2YMUHYHK5OKM77FB", "Arn": "arn:aws:iam::123456789012:role/GreengrassV2TokenExchangeRole", "CreateDate": "2021-02-06T00:13:29+00:00", "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "Service": "credentials.iot.amazonaws.com" }, "Action": "sts:AssumeRole" } ] } }
-
-
Create a file that contains the access policy document that the token exchange role requires.
For example, on a Linux-based system, you can run the following command to use GNU nano to create the file.
nano device-role-access-policy.json
Copy the following JSON into the file.
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "logs:CreateLogGroup", "logs:CreateLogStream", "logs:PutLogEvents", "logs:DescribeLogStreams", "s3:GetBucketLocation" ], "Resource": "*" } ] }
Note
This access policy doesn't allow access to component artifacts in S3 buckets. To deploy custom components that define artifacts in Amazon S3, you must add permissions to the role to allow your core device to retrieve component artifacts. For more information, see Allow access to S3 buckets for component artifacts.
If you don't yet have an S3 bucket for component artifacts, you can add these permissions later after you create a bucket.
-
Create the IAM policy from the policy document.
-
Replace
GreengrassV2TokenExchangeRoleAccess
with the name of the IAM policy to create.
aws iam create-policy --policy-name
GreengrassV2TokenExchangeRoleAccess
--policy-document file://device-role-access-policy.jsonThe response looks similar to the following example, if the request succeeds.
{ "Policy": { "PolicyName": "GreengrassV2TokenExchangeRoleAccess", "PolicyId": "ANPAZ2YMUHYHACI7C5Z66", "Arn": "arn:aws:iam::123456789012:policy/GreengrassV2TokenExchangeRoleAccess", "Path": "/", "DefaultVersionId": "v1", "AttachmentCount": 0, "PermissionsBoundaryUsageCount": 0, "IsAttachable": true, "CreateDate": "2021-02-06T00:37:17+00:00", "UpdateDate": "2021-02-06T00:37:17+00:00" } }
-
-
Attach the IAM policy to the token exchange role.
-
Replace
GreengrassV2TokenExchangeRole
with the name of the IAM role. -
Replace the policy ARN with the ARN of the IAM policy that you created in the previous step.
aws iam attach-role-policy --role-name
GreengrassV2TokenExchangeRole
--policy-arnarn:aws:iam::123456789012:policy/GreengrassV2TokenExchangeRoleAccess
The command doesn't have any output if the request succeeds.
-
-
-
Create an AWS IoT role alias that points to the token exchange role.
-
Replace
GreengrassCoreTokenExchangeRoleAlias
with the name of the role alias to create. -
Replace the role ARN with the ARN of the IAM role that you created in the previous step.
aws iot create-role-alias --role-alias
GreengrassCoreTokenExchangeRoleAlias
--role-arnarn:aws:iam::123456789012:role/GreengrassV2TokenExchangeRole
The response looks similar to the following example, if the request succeeds.
{ "roleAlias": "GreengrassCoreTokenExchangeRoleAlias", "roleAliasArn": "arn:aws:iot:us-west-2:123456789012:rolealias/GreengrassCoreTokenExchangeRoleAlias" }
Note
To create a role alias, you must have permission to pass the token exchange IAM role to AWS IoT. If you receive an error message when you try to create a role alias, check that your AWS user has this permission. For more information, see Granting a user permissions to pass a role to an AWS service in the AWS Identity and Access Management User Guide.
-
-
Create and attach an AWS IoT policy that allows your Greengrass core device to use the role alias to assume the token exchange role. If you have set up a Greengrass core device before, you can attach its role alias AWS IoT policy instead of creating a new one. Do the following:
-
(Optional) Create a file that contains the AWS IoT policy document that the role alias requires.
For example, on a Linux-based system, you can run the following command to use GNU nano to create the file.
nano greengrass-v2-iot-role-alias-policy.json
Copy the following JSON into the file.
-
Replace the resource ARN with the ARN of your role alias.
{ "Version":"2012-10-17", "Statement": [ { "Effect": "Allow", "Action": "iot:AssumeRoleWithCertificate", "Resource": "
arn:aws:iot:us-west-2:123456789012:rolealias/GreengrassCoreTokenExchangeRoleAlias
" } ] } -
-
Create an AWS IoT policy from the policy document.
-
Replace
GreengrassCoreTokenExchangeRoleAliasPolicy
with the name of the AWS IoT policy to create.
aws iot create-policy --policy-name
GreengrassCoreTokenExchangeRoleAliasPolicy
--policy-document file://greengrass-v2-iot-role-alias-policy.jsonThe response looks similar to the following example, if the request succeeds.
{ "policyName": "GreengrassCoreTokenExchangeRoleAliasPolicy", "policyArn": "arn:aws:iot:us-west-2:123456789012:policy/GreengrassCoreTokenExchangeRoleAliasPolicy", "policyDocument": "{ \\"Version\\":\\"2012-10-17\\", \\"Statement\\": [ { \\"Effect\\": \\"Allow\\", \\"Action\\": \\"iot:AssumeRoleWithCertificate\\", \\"Resource\\": \\"arn:aws:iot:us-west-2:123456789012:rolealias/GreengrassCoreTokenExchangeRoleAlias\\" } ] }", "policyVersionId": "1" }
-
-
Attach the AWS IoT policy to the AWS IoT thing's certificate.
-
Replace
GreengrassCoreTokenExchangeRoleAliasPolicy
with the name of the role alias AWS IoT policy. -
Replace the target ARN with the ARN of the certificate for your AWS IoT thing.
aws iot attach-policy --policy-name
GreengrassCoreTokenExchangeRoleAliasPolicy
--targetarn:aws:iot:us-west-2:123456789012:cert/aa0b7958770878eabe251d8a7ddd547f4889c524c9b574ab9fbf65f32248b1d4
The command doesn't have any output if the request succeeds.
-
-
Download certificates to the device
Earlier, you downloaded your device's certificate to your development computer. In this section, you copy the certificate to your core device to set up the device with the certificates that it uses to connect to AWS IoT. You also download the Amazon root certificate authority (CA) certificate. If you use an HSM, you also import the certificate file into the HSM in this section.
-
If you created the thing certificate and private key in the AWS IoT service earlier, follow the steps to download the certificates with private key and certificate files.
-
If you created the thing certificate from a private key in a hardware security module (HSM) earlier, follow the steps to download the certificates with the private key and certificate in an HSM.
Download certificates with private key and certificate files
To download certificates to the device
-
Copy the AWS IoT thing certificate from your development computer to the device. If SSH and SCP are enabled on the development computer and the device, you can use the
scp
command on your development computer to transfer the certificate. Replacedevice-ip-address
with the IP address of your device.scp -r greengrass-v2-certs/
device-ip-address
:~ -
Create the Greengrass root folder on the device. You'll later install the AWS IoT Greengrass Core software to this folder.
Note
Windows has a path length limitation of 260 characters. If you are using Windows, use a root folder like
C:\greengrass\v2
orD:\greengrass\v2
to keep the Greengrass components paths under the 260 character limit. -
(Linux only) Set the permissions of the parent of the Greengrass root folder.
-
Replace
/greengrass
with the parent of the root folder.
sudo chmod 755
/greengrass
-
-
Copy the AWS IoT thing certificates to the Greengrass root folder.
-
Download the Amazon root certificate authority (CA) certificate. AWS IoT certificates are associated with Amazon's root CA certificate by default. Download the CA1 certificate and the CA3 certificate
.
Download certificates with the private key and certificate in an HSM
Note
This feature is available for v2.5.3 and later of the Greengrass nucleus component. AWS IoT Greengrass doesn't currently support this feature on Windows core devices.
To download certificates to the device
-
Copy the AWS IoT thing certificate from your development computer to the device. If SSH and SCP are enabled on the development computer and the device, you can use the
scp
command on your development computer to transfer the certificate. Replacedevice-ip-address
with the IP address of your device.scp -r greengrass-v2-certs/
device-ip-address
:~ -
Create the Greengrass root folder on the device. You'll later install the AWS IoT Greengrass Core software to this folder.
Note
Windows has a path length limitation of 260 characters. If you are using Windows, use a root folder like
C:\greengrass\v2
orD:\greengrass\v2
to keep the Greengrass components paths under the 260 character limit. -
(Linux only) Set the permissions of the parent of the Greengrass root folder.
-
Replace
/greengrass
with the parent of the root folder.
sudo chmod 755
/greengrass
-
-
Import the thing certificate file,
~/greengrass-v2-certs/device.pem.crt
, into the HSM. Check the documentation for your HSM to learn how to import certificates into it. Import the certificate using the same token, slot ID, user PIN, object label, and object ID (if your HSM uses one) where you generated the private key in the HSM earlier.Note
If you generated the private key earlier without an object ID, and the certificate has an object ID, set the private key's object ID to the same value as the certificate. Check the documentation for your HSM to learn how to set the object ID for the private key object.
-
(Optional) Delete the thing certificate file, so that it exists only in the HSM.
rm ~/greengrass-v2-certs/device.pem.crt
-
Download the Amazon root certificate authority (CA) certificate. AWS IoT certificates are associated with Amazon's root CA certificate by default. Download both the CA1 and the CA3 certificate
.
Set up the device environment
Follow the steps in this section to set up a Linux or Windows device to use as your AWS IoT Greengrass core device.
Set up a Linux device
To set up a Linux device for AWS IoT Greengrass V2
-
Install the Java runtime, which AWS IoT Greengrass Core software requires to run. We recommend that you use Amazon Corretto
or OpenJDK long-term support versions. Version 8 or higher is required. The following commands show you how to install OpenJDK on your device. -
For Debian-based or Ubuntu-based distributions:
sudo apt install default-jdk
-
For Red Hat-based distributions:
sudo yum install java-11-openjdk-devel
-
For Amazon Linux 2:
sudo amazon-linux-extras install java-openjdk11
-
For Amazon Linux 2023:
sudo dnf install java-11-amazon-corretto -y
When the installation completes, run the following command to verify that Java runs on your Linux device.
java -version
The command prints the version of Java that runs on the device. For example, on a Debian-based distribution, the output might look similar to the following sample.
openjdk version "11.0.9.1" 2020-11-04 OpenJDK Runtime Environment (build 11.0.9.1+1-post-Debian-1deb10u2) OpenJDK 64-Bit Server VM (build 11.0.9.1+1-post-Debian-1deb10u2, mixed mode)
-
-
(Optional) Create the default system user and group that runs components on the device. You can also choose to let the AWS IoT Greengrass Core software installer create this user and group during installation with the
--component-default-user
installer argument. For more information, see Installer arguments.sudo useradd --system --create-home ggc_user sudo groupadd --system ggc_group
-
Verify that the user that runs the AWS IoT Greengrass Core software (typically
root
), has permission to runsudo
with any user and any group.-
Run the following command to open the
/etc/sudoers
file.sudo visudo
-
Verify that the permission for the user looks like the following example.
root ALL=(ALL:ALL) ALL
-
-
(Optional) To run containerized Lambda functions, you must enable cgroups
v1, and you must enable and mount the memory and devices cgroups. If you don't plan to run containerized Lambda functions, you can skip this step. To enable these cgroups options, boot the device with the following Linux kernel parameters.
cgroup_enable=memory cgroup_memory=1 systemd.unified_cgroup_hierarchy=0
For information about viewing and setting kernel parameters for your device, see the documentation for your operating system and boot loader. Follow the instructions to permanently set the kernel parameters.
-
Install all other required dependencies on your device as indicated by the list of requirements in Device requirements.
Set up a Windows device
Note
This feature is available for v2.5.0 and later of the Greengrass nucleus component.
To set up a Windows device for AWS IoT Greengrass V2
-
Install the Java runtime, which AWS IoT Greengrass Core software requires to run. We recommend that you use Amazon Corretto
or OpenJDK long-term support versions. Version 8 or higher is required. -
Check whether Java is available on the PATH
system variable, and add it if not. The LocalSystem account runs the AWS IoT Greengrass Core software, so you must add Java to the PATH system variable instead of the PATH user variable for your user. Do the following: -
Press the Windows key to open the start menu.
-
Type
environment variables
to search for the system options from the start menu. -
In the start menu search results, choose Edit the system environment variables to open the System properties window.
-
Choose Environment variables... to open the Environment Variables window.
-
Under System variables, select Path, and then choose Edit. In the Edit environment variable window, you can view each path on a separate line.
-
Check if the path to the Java installation's
bin
folder is present. The path might look similar to the following example.C:\\Program Files\\Amazon Corretto\\jdk11.0.13_8\\bin
-
If the Java installation's
bin
folder is missing from Path, choose New to add it, and then choose OK.
-
-
Open the Windows Command Prompt (
cmd.exe
) as an administrator. -
Create the default user in the LocalSystem account on the Windows device. Replace
password
with a secure password.net user /add ggc_user
password
Tip
Depending on your Windows configuration, the user's password might be set to expire at a date in the future. To ensure your Greengrass applications continue to operate, track when the password expires, and update it before it expires. You can also set the user's password to never expire.
-
To check when a user and its password expire, run the following command.
net user
ggc_user
| findstr /C:expires -
To set a user's password to never expire, run the following command.
wmic UserAccount where "Name='
ggc_user
'" set PasswordExpires=False -
If you’re using Windows 10 or later where the
wmic
command is deprecated, run the following PowerShell command. Get-CimInstance -Query "SELECT * from Win32_UserAccount WHERE name = '
ggc_user
'" | Set-CimInstance -Property @{PasswordExpires="False"}
-
-
Download and install the PsExec utility
from Microsoft on the device. -
Use the PsExec utility to store the user name and password for the default user in the Credential Manager instance for the LocalSystem account. Replace
password
with the user's password that you set earlier.psexec -s cmd /c cmdkey /generic:ggc_user /user:ggc_user /pass:
password
If the PsExec License Agreement opens, choose Accept to agree to the license and run the command.
Note
On Windows devices, the LocalSystem account runs the Greengrass nucleus, and you must use the PsExec utility to store the default user information in the LocalSystem account. Using the Credential Manager application stores this information in the Windows account of the currently logged on user, instead of the LocalSystem account.
Download the AWS IoT Greengrass Core software
You can download the latest version of the AWS IoT Greengrass Core software from the following location:
Note
You can download a specific version of the AWS IoT Greengrass Core software from the following location.
Replace version
with the version to download.
https://d2s8p88vqu9w66.cloudfront.net/releases/greengrass-
version
.zip
To download the AWS IoT Greengrass Core software
-
On your core device, download the AWS IoT Greengrass Core software to a file named
greengrass-nucleus-latest.zip
.By downloading this software, you agree to the Greengrass Core Software License Agreement
. -
(Optional) To verify the Greengrass nucleus software signature
Note
This feature is available with Greengrass nucleus version 2.9.5 and later.
-
Use the following command to verify your Greengrass nucleus artifact's signature:
-
The
jarsigner
invocation yields output that indicates the results of the verification.-
If the Greengrass nucleus zip file is signed, the output contains the following statement:
jar verified.
-
If the Greengrass nucleus zip file isn't signed, the output contains the following statement:
jar is unsigned.
-
-
If you provided the Jarsigner
-certs
option along with-verify
and-verbose
options, the output also includes detailed signer certificate information.
-
-
Unzip the AWS IoT Greengrass Core software to a folder on your device. Replace
GreengrassInstaller
with the folder that you want to use. -
(Optional) Run the following command to see the version of the AWS IoT Greengrass Core software.
java -jar ./
GreengrassInstaller
/lib/Greengrass.jar --version
Important
If you install a version of the Greengrass nucleus earlier than v2.4.0, don't remove this folder after you install the AWS IoT Greengrass Core software. The AWS IoT Greengrass Core software uses the files in this folder to run.
If you downloaded the latest version of the software, you install v2.4.0 or later, and you can remove this folder after you install the AWS IoT Greengrass Core software.
Install the AWS IoT Greengrass Core software
Run the installer with arguments that specify the following actions:
-
Install from a partial configuration file that specifies to use the AWS resources and certificates that you created earlier. The AWS IoT Greengrass Core software uses a configuration file that specifies the configuration of every Greengrass component on the device. The installer creates a complete configuration file from the partial configuration file that you provide.
-
Specify to use the
ggc_user
system user to run software components on the core device. On Linux devices, this command also specifies to use theggc_group
system group, and the installer creates the system user and group for you. -
Set up the AWS IoT Greengrass Core software as a system service that runs at boot. On Linux devices, this requires the Systemd
init system. Important
On Windows core devices, you must set up the AWS IoT Greengrass Core software as a system service.
For more information about the arguments that you can specify, see Installer arguments.
Note
If you are running AWS IoT Greengrass on a device with limited memory, you can
control the amount of memory that AWS IoT Greengrass Core software uses. To control memory allocation, you can set
JVM heap size options in the jvmOptions
configuration parameter in your nucleus
component. For more information, see Control memory allocation with JVM options.
-
If you created the thing certificate and private key in the AWS IoT service earlier, follow the steps to install the AWS IoT Greengrass Core software with private key and certificate files.
-
If you created the thing certificate from a private key in a hardware security module (HSM) earlier, follow the steps to install the AWS IoT Greengrass Core software with the private key and certificate in an HSM.
Install the AWS IoT Greengrass Core software with private key and certificate files
To install the AWS IoT Greengrass Core software
-
Check the version of the AWS IoT Greengrass Core software.
-
Replace
GreengrassInstaller
with the path to the folder that contains the software.
java -jar ./
GreengrassInstaller
/lib/Greengrass.jar --version -
-
Use a text editor to create a configuration file named
config.yaml
to provide to the installer.For example, on a Linux-based system, you can run the following command to use GNU nano to create the file.
nano
GreengrassInstaller
/config.yamlCopy the following YAML content into the file. This partial configuration file specifies system parameters and Greengrass nucleus parameters.
--- system: certificateFilePath: "
/device.pem.crt" privateKeyPath: "/greengrass/v2
/private.pem.key" rootCaPath: "/greengrass/v2
/AmazonRootCA1.pem" rootpath: "/greengrass/v2
" thingName: "/greengrass/v2
MyGreengrassCore
" services: aws.greengrass.Nucleus: componentType: "NUCLEUS" version: "2.13.0
" configuration: awsRegion: "us-west-2
" iotRoleAlias: "GreengrassCoreTokenExchangeRoleAlias
" fipsMode: "true" iotDataEndpoint: "data.iot-fips.us-west-2.amazonaws.com
" greengrassDataPlaneEndpoint: "iotData" iotCredEndpoint: "data.credentials.iot-fips.us-west-2.amazonaws.com
"Then, do the following:
-
Replace each instance of
with the Greengrass root folder./greengrass/v2
-
Replace
MyGreengrassCore
with the name of the AWS IoT thing. -
Replace
2.13.0
with the version of the AWS IoT Greengrass Core software. -
Replace
us-west-2
with the AWS Region where you created the resources. -
Replace
GreengrassCoreTokenExchangeRoleAlias
with the name of the token exchange role alias. -
Replace the
iotDataEndpoint
with your AWS IoT data endpoint. -
Replace the
iotCredEndpoint
with your AWS IoT credentials endpoint.
-
-
Run the installer, and specify
--init-config
to provide the configuration file.-
Replace
or/greengrass/v2
C:\greengrass\v2
with the Greengrass root folder. -
Replace each instance of
GreengrassInstaller
with the folder where you unpacked the installer.
Important
On Windows core devices, you must specify
--setup-system-service true
to set up the AWS IoT Greengrass Core software as a system service.If you specify
--setup-system-service true
, the installer printsSuccessfully set up Nucleus as a system service
if it set up and ran the software as a system service. Otherwise, the installer doesn't output any message if it installs the software successfully.Note
You can't use the
deploy-dev-tools
argument to deploy local development tools when you run the installer without the--provision true
argument. For information about deploying the Greengrass CLI directly on your device, see Greengrass Command Line Interface. -
-
Verify the installation by viewing the files in the root folder.
If the installation succeeded, the root folder contains several folders, such as
config
,packages
, andlogs
.
Install the AWS IoT Greengrass Core software with the private key and certificate in an HSM
Note
This feature is available for v2.5.3 and later of the Greengrass nucleus component. AWS IoT Greengrass doesn't currently support this feature on Windows core devices.
To install the AWS IoT Greengrass Core software
-
Check the version of the AWS IoT Greengrass Core software.
-
Replace
GreengrassInstaller
with the path to the folder that contains the software.
java -jar ./
GreengrassInstaller
/lib/Greengrass.jar --version -
-
To enable the AWS IoT Greengrass Core software to use the private key and certificate in the HSM, install the PKCS#11 provider component when you install the AWS IoT Greengrass Core software. The PKCS#11 provider component is a plugin that you can configure during installation. You can download the latest version of the PKCS#11 provider component from the following location:
Download the PKCS#11 provider plugin to a file named
aws.greengrass.crypto.Pkcs11Provider.jar
. ReplaceGreengrassInstaller
with the folder that you want to use.curl -s https://d2s8p88vqu9w66.cloudfront.net/releases/Pkcs11Provider/aws.greengrass.crypto.Pkcs11Provider-latest.jar >
GreengrassInstaller
/aws.greengrass.crypto.Pkcs11Provider.jarBy downloading this software, you agree to the Greengrass Core Software License Agreement
. -
Use a text editor to create a configuration file named
config.yaml
to provide to the installer.For example, on a Linux-based system, you can run the following command to use GNU nano to create the file.
nano
GreengrassInstaller
/config.yamlCopy the following YAML content into the file. This partial configuration file specifies system parameters, Greengrass nucleus parameters, and PKCS#11 provider parameters.
--- system: certificateFilePath: "
/device.pem.crt" privateKeyPath: "/greengrass/v2
/private.pem.key" rootCaPath: "/greengrass/v2
/AmazonRootCA1.pem" rootpath: "/greengrass/v2
" thingName: "/greengrass/v2
MyGreengrassCore
" services: aws.greengrass.Nucleus: componentType: "NUCLEUS" version: "2.13.0
" configuration: awsRegion: "us-west-2
" iotRoleAlias: "GreengrassCoreTokenExchangeRoleAlias
" fipsMode: "true" iotDataEndpoint: "data.iot-fips.us-west-2.amazonaws.com
" greengrassDataPlaneEndpoint: "iotData" iotCredEndpoint: "data.credentials.iot-fips.us-west-2.amazonaws.com
"Then, do the following:
-
Replace each instance of
iotdevicekey
in the PKCS#11 URIs with the object label where you created the private key and imported the certificate. -
Replace each instance of
with the Greengrass root folder./greengrass/v2
-
Replace
MyGreengrassCore
with the name of the AWS IoT thing. -
Replace
2.13.0
with the version of the AWS IoT Greengrass Core software. -
Replace
us-west-2
with the AWS Region where you created the resources. -
Replace
GreengrassCoreTokenExchangeRoleAlias
with the name of the token exchange role alias. -
Replace the
iotDataEndpoint
with your AWS IoT data endpoint. -
Replace the
iotCredEndpoint
with your AWS IoT credentials endpoint. -
Replace the configuration parameters for the
aws.greengrass.crypto.Pkcs11Provider
component with the values for the HSM configuration on the core device.
-
-
Run the installer, and specify
--init-config
to provide the configuration file.-
Replace
with the Greengrass root folder./greengrass/v2
-
Replace each instance of
GreengrassInstaller
with the folder where you unpacked the installer.
sudo -E java -Droot="
" -Dlog.store=FILE \ -jar .//greengrass/v2
GreengrassInstaller
/lib/Greengrass.jar \ --trusted-plugin ./GreengrassInstaller
/aws.greengrass.crypto.Pkcs11Provider.jar \ --init-config ./GreengrassInstaller
/config.yaml \ --component-default-user ggc_user:ggc_group \ --setup-system-service trueImportant
On Windows core devices, you must specify
--setup-system-service true
to set up the AWS IoT Greengrass Core software as a system service.If you specify
--setup-system-service true
, the installer printsSuccessfully set up Nucleus as a system service
if it set up and ran the software as a system service. Otherwise, the installer doesn't output any message if it installs the software successfully.Note
You can't use the
deploy-dev-tools
argument to deploy local development tools when you run the installer without the--provision true
argument. For information about deploying the Greengrass CLI directly on your device, see Greengrass Command Line Interface. -
-
Verify the installation by viewing the files in the root folder.
If the installation succeeded, the root folder contains several folders, such as
config
,packages
, andlogs
.
If you installed the AWS IoT Greengrass Core software as a system service, the installer runs the software for you. Otherwise, you must run the software manually. For more information, see Run the AWS IoT Greengrass Core software.
For more information about how to configure and use the software and AWS IoT Greengrass, see the following:
Install FIPS endpoints with fleet provisioning
This feature is available for v2.4.0 and later of the Greengrass nucleus component.
Install FIPS endpoints on your AWS IoT Greengrass Core software with AWS IoT fleet provisioning for your core devices.
Note
The fleet provisioning plugin doesn't currently support storing private key and certificate files in a hardware security module (HSM). To use an HSM, install the AWS IoT Greengrass Core software with manual provisioning.
To install the AWS IoT Greengrass Core software with AWS IoT fleet provisioning, you must set up resources in your AWS account that AWS IoT uses to provision Greengrass core devices. These resources include a provisioning template, claim certificates, and a token exchange IAM role. After you create these resources, you can reuse them to provision multiple core devices in a fleet. For more information, see Set up AWS IoT fleet provisioning for Greengrass core devices.
Important
Before you download the AWS IoT Greengrass Core software, check that your core device meets the requirements to install and run the AWS IoT Greengrass Core software v2.0.
Topics
Prerequisites
To install the AWS IoT Greengrass Core software with AWS IoT fleet provisioning, you must first set up AWS IoT fleet provisioning for Greengrass core devices. After you complete these steps once, you can use fleet provisioning to install the AWS IoT Greengrass Core software on any number of devices.
Retrieve AWS IoT endpoints
Get the FIPS endpoints for your AWS account, and save them to use later. Your device uses these endpoints to connect to AWS IoT. Do the following:
-
Get the FIPS data endpoint for your region in the AWS IoT Core FIPS data plane endpoints. The FIPS data endpoint for your AWS account should look like this:
data.iot-fips.us-west-2.amazonaws.com
-
Get the FIPS credentials endpoint for your region in the AWS IoT Core FIPS data plane endpoints. The FIPS credentials endpoint for your AWS account should look like this:
data.credentials.iot-fips.us-west-2.amazonaws.com
Download certificates to the device
The device uses a claim certificate and private key to authenticate its request to provision AWS resources and acquire an X.509 device certificate. You can embed the claim certificate and private key into the device during manufacturing, or copy the certificate and key to the device during installation. In this section, you copy the claim certificate and private key to the device. You also download the Amazon Root certificate authority (CA) certificate to the device.
Important
Provisioning claim private keys should be secured at all times, including on Greengrass core devices. We recommend that you use Amazon CloudWatch metrics and logs to monitor for indications of misuse, such as unauthorized use of the claim certificate to provision devices. If you detect misuse, disable the provisioning claim certificate so that it can't be used for device provisioning. For more information, see Monitoring AWS IoT in the AWS IoT Core Developer Guide.
To help you better manage the number of devices, and which devices, that register themselves in your AWS account, you can specify a pre-provisioning hook when you create a fleet provisioning template. A pre-provisioning hook is an AWS Lambda function that validates template parameters that devices provide during registration. For example, you might create a pre-provisioning hook that checks a device ID against a database to verify that the device has permission to provision. For more information, see Pre-provisioning hooks in the AWS IoT Core Developer Guide.
To download claim certificates to the device
-
Copy the claim certificate and private key to the device. If SSH and SCP are enabled on the development computer and the device, you can use the
scp
command on your development computer to transfer the claim certificate and private key. The following example command transfers these files a folder namedclaim-certs
on your development computer to the device. Replacedevice-ip-address
with the IP address of your device.scp -r claim-certs/
device-ip-address
:~ -
Create the Greengrass root folder on the device. You'll later install the AWS IoT Greengrass Core software to this folder.
Note
Windows has a path length limitation of 260 characters. If you are using Windows, use a root folder like
C:\greengrass\v2
orD:\greengrass\v2
to keep the Greengrass components paths under the 260 character limit. -
(Linux only) Set the permissions of the parent of the Greengrass root folder.
-
Replace
/greengrass
with the parent of the root folder.
sudo chmod 755
/greengrass
-
-
Move the claim certificates to the Greengrass root folder.
-
Replace
or/greengrass/v2
C:\greengrass\v2
with the Greengrass root folder.
-
-
Download both the CA1 certificate and the CA3 certificate
.
Set up the device environment
Follow the steps in this section to set up a Linux or Windows device to use as your AWS IoT Greengrass core device.
Set up a Linux device
To set up a Linux device for AWS IoT Greengrass V2
-
Install the Java runtime, which AWS IoT Greengrass Core software requires to run. We recommend that you use Amazon Corretto
or OpenJDK long-term support versions. Version 8 or higher is required. The following commands show you how to install OpenJDK on your device. -
For Debian-based or Ubuntu-based distributions:
sudo apt install default-jdk
-
For Red Hat-based distributions:
sudo yum install java-11-openjdk-devel
-
For Amazon Linux 2:
sudo amazon-linux-extras install java-openjdk11
-
For Amazon Linux 2023:
sudo dnf install java-11-amazon-corretto -y
When the installation completes, run the following command to verify that Java runs on your Linux device.
java -version
The command prints the version of Java that runs on the device. For example, on a Debian-based distribution, the output might look similar to the following sample.
openjdk version "11.0.9.1" 2020-11-04 OpenJDK Runtime Environment (build 11.0.9.1+1-post-Debian-1deb10u2) OpenJDK 64-Bit Server VM (build 11.0.9.1+1-post-Debian-1deb10u2, mixed mode)
-
-
(Optional) Create the default system user and group that runs components on the device. You can also choose to let the AWS IoT Greengrass Core software installer create this user and group during installation with the
--component-default-user
installer argument. For more information, see Installer arguments.sudo useradd --system --create-home ggc_user sudo groupadd --system ggc_group
-
Verify that the user that runs the AWS IoT Greengrass Core software (typically
root
), has permission to runsudo
with any user and any group.-
Run the following command to open the
/etc/sudoers
file.sudo visudo
-
Verify that the permission for the user looks like the following example.
root ALL=(ALL:ALL) ALL
-
-
(Optional) To run containerized Lambda functions, you must enable cgroups
v1, and you must enable and mount the memory and devices cgroups. If you don't plan to run containerized Lambda functions, you can skip this step. To enable these cgroups options, boot the device with the following Linux kernel parameters.
cgroup_enable=memory cgroup_memory=1 systemd.unified_cgroup_hierarchy=0
For information about viewing and setting kernel parameters for your device, see the documentation for your operating system and boot loader. Follow the instructions to permanently set the kernel parameters.
-
Install all other required dependencies on your device as indicated by the list of requirements in Device requirements.
Set up a Windows device
Note
This feature is available for v2.5.0 and later of the Greengrass nucleus component.
To set up a Windows device for AWS IoT Greengrass V2
-
Install the Java runtime, which AWS IoT Greengrass Core software requires to run. We recommend that you use Amazon Corretto
or OpenJDK long-term support versions. Version 8 or higher is required. -
Check whether Java is available on the PATH
system variable, and add it if not. The LocalSystem account runs the AWS IoT Greengrass Core software, so you must add Java to the PATH system variable instead of the PATH user variable for your user. Do the following: -
Press the Windows key to open the start menu.
-
Type
environment variables
to search for the system options from the start menu. -
In the start menu search results, choose Edit the system environment variables to open the System properties window.
-
Choose Environment variables... to open the Environment Variables window.
-
Under System variables, select Path, and then choose Edit. In the Edit environment variable window, you can view each path on a separate line.
-
Check if the path to the Java installation's
bin
folder is present. The path might look similar to the following example.C:\\Program Files\\Amazon Corretto\\jdk11.0.13_8\\bin
-
If the Java installation's
bin
folder is missing from Path, choose New to add it, and then choose OK.
-
-
Open the Windows Command Prompt (
cmd.exe
) as an administrator. -
Create the default user in the LocalSystem account on the Windows device. Replace
password
with a secure password.net user /add ggc_user
password
Tip
Depending on your Windows configuration, the user's password might be set to expire at a date in the future. To ensure your Greengrass applications continue to operate, track when the password expires, and update it before it expires. You can also set the user's password to never expire.
-
To check when a user and its password expire, run the following command.
net user
ggc_user
| findstr /C:expires -
To set a user's password to never expire, run the following command.
wmic UserAccount where "Name='
ggc_user
'" set PasswordExpires=False -
If you’re using Windows 10 or later where the
wmic
command is deprecated, run the following PowerShell command. Get-CimInstance -Query "SELECT * from Win32_UserAccount WHERE name = '
ggc_user
'" | Set-CimInstance -Property @{PasswordExpires="False"}
-
-
Download and install the PsExec utility
from Microsoft on the device. -
Use the PsExec utility to store the user name and password for the default user in the Credential Manager instance for the LocalSystem account. Replace
password
with the user's password that you set earlier.psexec -s cmd /c cmdkey /generic:ggc_user /user:ggc_user /pass:
password
If the PsExec License Agreement opens, choose Accept to agree to the license and run the command.
Note
On Windows devices, the LocalSystem account runs the Greengrass nucleus, and you must use the PsExec utility to store the default user information in the LocalSystem account. Using the Credential Manager application stores this information in the Windows account of the currently logged on user, instead of the LocalSystem account.
Download the AWS IoT Greengrass Core software
You can download the latest version of the AWS IoT Greengrass Core software from the following location:
Note
You can download a specific version of the AWS IoT Greengrass Core software from the following
location. Replace version
with the version to
download.
https://d2s8p88vqu9w66.cloudfront.net/releases/greengrass-
version
.zip
To download the AWS IoT Greengrass Core software
-
On your core device, download the AWS IoT Greengrass Core software to a file named
greengrass-nucleus-latest.zip
.By downloading this software, you agree to the Greengrass Core Software License Agreement
. -
(Optional) To verify the Greengrass nucleus software signature
Note
This feature is available with Greengrass nucleus version 2.9.5 and later.
-
Use the following command to verify your Greengrass nucleus artifact's signature:
-
The
jarsigner
invocation yields output that indicates the results of the verification.-
If the Greengrass nucleus zip file is signed, the output contains the following statement:
jar verified.
-
If the Greengrass nucleus zip file isn't signed, the output contains the following statement:
jar is unsigned.
-
-
If you provided the Jarsigner
-certs
option along with-verify
and-verbose
options, the output also includes detailed signer certificate information.
-
-
Unzip the AWS IoT Greengrass Core software to a folder on your device. Replace
GreengrassInstaller
with the folder that you want to use. -
(Optional) Run the following command to see the version of the AWS IoT Greengrass Core software.
java -jar ./
GreengrassInstaller
/lib/Greengrass.jar --version
Important
If you install a version of the Greengrass nucleus earlier than v2.4.0, don't remove this folder after you install the AWS IoT Greengrass Core software. The AWS IoT Greengrass Core software uses the files in this folder to run.
If you downloaded the latest version of the software, you install v2.4.0 or later, and you can remove this folder after you install the AWS IoT Greengrass Core software.
Download the AWS IoT fleet provisioning plugin
You can download the latest version of the AWS IoT fleet provisioning plugin from the following location:
Note
You can download a specific version of the AWS IoT fleet provisioning plugin
from the following location. Replace version
with the
version to download. For more information about each version of the fleet
provisioning plugin, see AWS IoT fleet provisioning plugin changelog.
https://d2s8p88vqu9w66.cloudfront.net/releases/aws-greengrass-FleetProvisioningByClaim/fleetprovisioningbyclaim-
version
.jar
The fleet provisioning plugin is open source. To view its source code, see the
AWS IoT fleet provisioning plugin
To download the AWS IoT fleet provisioning plugin
-
On your device, download the AWS IoT fleet provisioning plugin to a file named
aws.greengrass.FleetProvisioningByClaim.jar
. ReplaceGreengrassInstaller
with the folder that you want to use.By downloading this software, you agree to the Greengrass Core Software License Agreement
.
Install the AWS IoT Greengrass Core software
Run the installer with arguments that specify the following actions:
-
Install from a partial configuration file that specifies to use the fleet provisioning plugin to provision AWS resources. The AWS IoT Greengrass Core software uses a configuration file that specifies the configuration of every Greengrass component on the device. The installer creates a complete configuration file from the partial configuration file that you provide and the AWS resources that the fleet provisioning plugin creates.
-
Specify to use the
ggc_user
system user to run software components on the core device. On Linux devices, this command also specifies to use theggc_group
system group, and the installer creates the system user and group for you. -
Set up the AWS IoT Greengrass Core software as a system service that runs at boot. On Linux devices, this requires the Systemd
init system. Important
On Windows core devices, you must set up the AWS IoT Greengrass Core software as a system service.
For more information about the arguments that you can specify, see Installer arguments.
Note
If you are running AWS IoT Greengrass on a device with limited memory, you can
control the amount of memory that AWS IoT Greengrass Core software uses. To control memory allocation, you can set
JVM heap size options in the jvmOptions
configuration parameter in your nucleus
component. For more information, see Control memory allocation with JVM options.
To install the AWS IoT Greengrass Core software
-
Check the version of the AWS IoT Greengrass Core software.
-
Replace
GreengrassInstaller
with the path to the folder that contains the software.
java -jar ./
GreengrassInstaller
/lib/Greengrass.jar --version -
-
Use a text editor to create a configuration file named
config.yaml
to provide to the installer.For example, on a Linux-based system, you can run the following command to use GNU nano to create the file.
nano
GreengrassInstaller
/config.yamlCopy the following YAML content into the file. This partial configuration file specifies parameters for the fleet provisioning plugin. For more information about the options that you can specify, see Configure the AWS IoT fleet provisioning plugin.
Then, do the following:
-
Replace
2.13.0
with the version of the AWS IoT Greengrass Core software. -
Replace each instance of
or/greengrass/v2
C:\greengrass\v2
with the Greengrass root folder.Note
On Windows devices, you must specify path separators as double backslashes (
\\
), such asC:\\greengrass\\v2
. -
Replace
us-west-2
with the AWS Region where you created the provisioning template and other resources. -
Replace the
iotDataEndpoint
with your AWS IoT data endpoint. -
Replace the
iotCredentialEndpoint
with your AWS IoT credentials endpoint. -
Replace
GreengrassCoreTokenExchangeRoleAlias
with the name of the token exchange role alias. -
Replace
GreengrassFleetProvisioningTemplate
with the name of the fleet provisioning template. -
Replace the
claimCertificatePath
with the path to the claim certificate on the device. -
Replace the
claimCertificatePrivateKeyPath
with the path to the claim certificate private key on the device. -
Replace the template parameters (
templateParameters
) with the values to use to provision the device. This example refers to the example template that definesThingName
andThingGroupName
parameters.
-
-
Run the installer. Specify
--trusted-plugin
to provide the fleet provisioning plugin, and specify--init-config
to provide the configuration file.-
Replace
with the Greengrass root folder./greengrass/v2
-
Replace each instance of
GreengrassInstaller
with the folder where you unpacked the installer.
Important
On Windows core devices, you must specify
--setup-system-service true
to set up the AWS IoT Greengrass Core software as a system service.If you specify
--setup-system-service true
, the installer printsSuccessfully set up Nucleus as a system service
if it set up and ran the software as a system service. Otherwise, the installer doesn't output any message if it installs the software successfully.Note
You can't use the
deploy-dev-tools
argument to deploy local development tools when you run the installer without the--provision true
argument. For information about deploying the Greengrass CLI directly on your device, see Greengrass Command Line Interface. -
-
Verify the installation by viewing the files in the root folder.
If the installation succeeded, the root folder contains several folders, such as
config
,packages
, andlogs
.
If you installed the AWS IoT Greengrass Core software as a system service, the installer runs the software for you. Otherwise, you must run the software manually. For more information, see Run the AWS IoT Greengrass Core software.
For more information about how to configure and use the software and AWS IoT Greengrass, see the following:
Install FIPS endpoints with auto resource provisioning
The AWS IoT Greengrass Core software includes an installer that sets up your device as a Greengrass core device. To set up a device quickly, the installer can provision the AWS IoT thing, AWS IoT thing group, IAM role, and AWS IoT role alias that the core device requires to operate. The installer can also deploy the local development tools to the core device, so you can use the device to develop and test custom software components. The installer requires AWS credentials to provision these resources and create the deployment.
If you can't provide AWS credentials to the device, you can provision the AWS resources that the core device requires to operate. You can also deploy the development tools to a core device to use as a development device. This enables you to provide fewer permissions to the device when you run the installer. For more information, see Install AWS IoT Greengrass Core software with manual resource provisioning.
Important
Before you download the AWS IoT Greengrass Core software, check that your core device meets the requirements to install and run the AWS IoT Greengrass Core software v2.0.
Topics
Set up the device environment
Follow the steps in this section to set up a Linux or Windows device to use as your AWS IoT Greengrass core device.
Set up a Linux device
To set up a Linux device for AWS IoT Greengrass V2
-
Install the Java runtime, which AWS IoT Greengrass Core software requires to run. We recommend that you use Amazon Corretto
or OpenJDK long-term support versions. Version 8 or higher is required. The following commands show you how to install OpenJDK on your device. -
For Debian-based or Ubuntu-based distributions:
sudo apt install default-jdk
-
For Red Hat-based distributions:
sudo yum install java-11-openjdk-devel
-
For Amazon Linux 2:
sudo amazon-linux-extras install java-openjdk11
-
For Amazon Linux 2023:
sudo dnf install java-11-amazon-corretto -y
When the installation completes, run the following command to verify that Java runs on your Linux device.
java -version
The command prints the version of Java that runs on the device. For example, on a Debian-based distribution, the output might look similar to the following sample.
openjdk version "11.0.9.1" 2020-11-04 OpenJDK Runtime Environment (build 11.0.9.1+1-post-Debian-1deb10u2) OpenJDK 64-Bit Server VM (build 11.0.9.1+1-post-Debian-1deb10u2, mixed mode)
-
-
(Optional) Create the default system user and group that runs components on the device. You can also choose to let the AWS IoT Greengrass Core software installer create this user and group during installation with the
--component-default-user
installer argument. For more information, see Installer arguments.sudo useradd --system --create-home ggc_user sudo groupadd --system ggc_group
-
Verify that the user that runs the AWS IoT Greengrass Core software (typically
root
), has permission to runsudo
with any user and any group.-
Run the following command to open the
/etc/sudoers
file.sudo visudo
-
Verify that the permission for the user looks like the following example.
root ALL=(ALL:ALL) ALL
-
-
(Optional) To run containerized Lambda functions, you must enable cgroups
v1, and you must enable and mount the memory and devices cgroups. If you don't plan to run containerized Lambda functions, you can skip this step. To enable these cgroups options, boot the device with the following Linux kernel parameters.
cgroup_enable=memory cgroup_memory=1 systemd.unified_cgroup_hierarchy=0
For information about viewing and setting kernel parameters for your device, see the documentation for your operating system and boot loader. Follow the instructions to permanently set the kernel parameters.
-
Install all other required dependencies on your device as indicated by the list of requirements in Device requirements.
Set up a Windows device
Note
This feature is available for v2.5.0 and later of the Greengrass nucleus component.
To set up a Windows device for AWS IoT Greengrass V2
-
Install the Java runtime, which AWS IoT Greengrass Core software requires to run. We recommend that you use Amazon Corretto
or OpenJDK long-term support versions. Version 8 or higher is required. -
Check whether Java is available on the PATH
system variable, and add it if not. The LocalSystem account runs the AWS IoT Greengrass Core software, so you must add Java to the PATH system variable instead of the PATH user variable for your user. Do the following: -
Press the Windows key to open the start menu.
-
Type
environment variables
to search for the system options from the start menu. -
In the start menu search results, choose Edit the system environment variables to open the System properties window.
-
Choose Environment variables... to open the Environment Variables window.
-
Under System variables, select Path, and then choose Edit. In the Edit environment variable window, you can view each path on a separate line.
-
Check if the path to the Java installation's
bin
folder is present. The path might look similar to the following example.C:\\Program Files\\Amazon Corretto\\jdk11.0.13_8\\bin
-
If the Java installation's
bin
folder is missing from Path, choose New to add it, and then choose OK.
-
-
Open the Windows Command Prompt (
cmd.exe
) as an administrator. -
Create the default user in the LocalSystem account on the Windows device. Replace
password
with a secure password.net user /add ggc_user
password
Tip
Depending on your Windows configuration, the user's password might be set to expire at a date in the future. To ensure your Greengrass applications continue to operate, track when the password expires, and update it before it expires. You can also set the user's password to never expire.
-
To check when a user and its password expire, run the following command.
net user
ggc_user
| findstr /C:expires -
To set a user's password to never expire, run the following command.
wmic UserAccount where "Name='
ggc_user
'" set PasswordExpires=False -
If you’re using Windows 10 or later where the
wmic
command is deprecated, run the following PowerShell command. Get-CimInstance -Query "SELECT * from Win32_UserAccount WHERE name = '
ggc_user
'" | Set-CimInstance -Property @{PasswordExpires="False"}
-
-
Download and install the PsExec utility
from Microsoft on the device. -
Use the PsExec utility to store the user name and password for the default user in the Credential Manager instance for the LocalSystem account. Replace
password
with the user's password that you set earlier.psexec -s cmd /c cmdkey /generic:ggc_user /user:ggc_user /pass:
password
If the PsExec License Agreement opens, choose Accept to agree to the license and run the command.
Note
On Windows devices, the LocalSystem account runs the Greengrass nucleus, and you must use the PsExec utility to store the default user information in the LocalSystem account. Using the Credential Manager application stores this information in the Windows account of the currently logged on user, instead of the LocalSystem account.
Provide AWS credentials to the device
Provide your AWS credentials to your device so that the installer can provision the required AWS resources. For more information about the required permissions, see Minimal IAM policy for installer to provision resources.
To provide AWS credentials to the device
-
Provide your AWS credentials to the device so that the installer can provision the AWS IoT and IAM resources for your core device. To increase security, we recommend that you get temporary credentials for an IAM role that allows only the minimum permissions necessary to provision. For more information, see Minimal IAM policy for installer to provision resources.
Note
The installer doesn't save or store your credentials.
On your device, do one of the following to retrieve credentials and make them available to the AWS IoT Greengrass Core software installer:
-
(Recommended) Use temporay credentials from AWS IAM Identity Center
-
Provide the access key ID, secret access key, and session token from the IAM Identity Center. For more information, see Manual credential refresh in Getting and refreshing temporary credentials in the IAM Identity Center user guide.
-
Run the following commands to provide the credentials to the AWS IoT Greengrass Core software.
-
-
Use temporary security credentials from an IAM role:
-
Provide the access key ID, secret access key, and session token from an IAM role that you assume. For more information about how to retrieve these credentials, see Requesting temporary security credentials in the IAM User Guide.
-
Run the following commands to provide the credentials to the AWS IoT Greengrass Core software.
-
-
Use long-term credentials from an IAM user:
-
Provide the access key ID and secret access key for your IAM user. You can create an IAM user for provisioning that you later delete. For the IAM policy to give the user, see Minimal IAM policy for installer to provision resources. For more information about how to retrieve long-term credentials, see Managing access keys for IAM users in the IAM User Guide.
-
Run the following commands to provide the credentials to the AWS IoT Greengrass Core software.
-
(Optional) If you created an IAM user to provision your Greengrass device, delete the user.
-
(Optional) If you used the access key ID and secret access key from an existing IAM user, update the keys for the user so that they are no longer valid. For more information, see Updating access keys in the AWS Identity and Access Management user guide.
-
-
Download the AWS IoT Greengrass Core software
You can download the latest version of the AWS IoT Greengrass Core software from the following location:
Note
You can download a specific version of the AWS IoT Greengrass Core software from the following
location. Replace version
with the version to
download.
https://d2s8p88vqu9w66.cloudfront.net/releases/greengrass-
version
.zip
To download the AWS IoT Greengrass Core software
-
On your core device, download the AWS IoT Greengrass Core software to a file named
greengrass-nucleus-latest.zip
.By downloading this software, you agree to the Greengrass Core Software License Agreement
. -
(Optional) To verify the Greengrass nucleus software signature
Note
This feature is available with Greengrass nucleus version 2.9.5 and later.
-
Use the following command to verify your Greengrass nucleus artifact's signature:
-
The
jarsigner
invocation yields output that indicates the results of the verification.-
If the Greengrass nucleus zip file is signed, the output contains the following statement:
jar verified.
-
If the Greengrass nucleus zip file isn't signed, the output contains the following statement:
jar is unsigned.
-
-
If you provided the Jarsigner
-certs
option along with-verify
and-verbose
options, the output also includes detailed signer certificate information.
-
-
Unzip the AWS IoT Greengrass Core software to a folder on your device. Replace
GreengrassInstaller
with the folder that you want to use. -
(Optional) Run the following command to see the version of the AWS IoT Greengrass Core software.
java -jar ./
GreengrassInstaller
/lib/Greengrass.jar --version
Important
If you install a version of the Greengrass nucleus earlier than v2.4.0, don't remove this folder after you install the AWS IoT Greengrass Core software. The AWS IoT Greengrass Core software uses the files in this folder to run.
If you downloaded the latest version of the software, you install v2.4.0 or later, and you can remove this folder after you install the AWS IoT Greengrass Core software.
Install the AWS IoT Greengrass Core software
Run the installer with arguments that specify to do the following:
-
Create the AWS resources that the core device requires to operate.
-
Specify to use the
ggc_user
system user to run software components on the core device. On Linux devices, this command also specifies to use theggc_group
system group, and the installer creates the system user and group for you. -
Set up the AWS IoT Greengrass Core software as a system service that runs at boot. On Linux devices, this requires the Systemd
init system. Important
On Windows core devices, you must set up the AWS IoT Greengrass Core software as a system service.
To set up a development device with local development tools, specify the
--deploy-dev-tools true
argument. The local development tools can
take up to a minute to deploy after the installation completes.
For more information about the arguments that you can specify, see Installer arguments.
Note
If you are running AWS IoT Greengrass on a device with limited memory, you can
control the amount of memory that AWS IoT Greengrass Core software uses. To control memory allocation, you can set
JVM heap size options in the jvmOptions
configuration parameter in your nucleus
component. For more information, see Control memory allocation with JVM options.
To install the AWS IoT Greengrass Core software
-
Use a text editor to create a configuration file named
config.yaml
to provide to the installer.For example, on a Linux-based system, you can run the following command to use GNU nano to create the file.
nano
GreengrassInstaller
/config.yamlCopy the following YAML content into the file. This partial configuration file specifies system parameters and Greengrass nucleus parameters.
--- services: aws.greengrass.Nucleus: configuration: fipsMode: "true" iotDataEndpoint: "
data.iot-fips.us-west-2.amazonaws.com
" iotCredEndpoint: "data.credentials.iot-fips.us-west-2.amazonaws.com
" greengrassDataPlaneEndpoint: "iotData"-
Replace
us-west-2
with the AWS Region where you created the resources. -
Replace the
iotDataEndpoint
with your AWS IoT data endpoint. -
Replace the
iotCredEndpoint
with your AWS IoT credentials endpoint.
-
-
Run the AWS IoT Greengrass Core installer. Replace argument values in your command as follows.
Note
Windows has a path length limitation of 260 characters. If you are using Windows, use a root folder like
C:\greengrass\v2
orD:\greengrass\v2
to keep the Greengrass components paths under the 260 character limit.-
or/greengrass/v2
C:\greengrass\v2
: The path to the root folder to use to install the AWS IoT Greengrass Core software. -
GreengrassInstaller
. The path to the folder where you unpacked the AWS IoT Greengrass Core software installer. -
region
. The AWS Region in which to find or create resources. -
MyGreengrassCore
. The name of the AWS IoT thing for your Greengrass core device. If the thing doesn't exist, the installer creates it. The installer downloads the certificates to authenticate as the AWS IoT thing. For more information, see Device authentication and authorization for AWS IoT Greengrass.Note
The thing name can't contain colon (
:
) characters. -
MyGreengrassCoreGroup
. The name of AWS IoT thing group for your Greengrass core device. If the thing group doesn't exist, the installer creates it and adds the thing to it. If the thing group exists and has an active deployment, the core device downloads and runs the software that the deployment specifies.Note
The thing group name can't contain colon (
:
) characters. -
GreengrassV2IoTThingPolicy
. The name of the AWS IoT policy that allows the Greengrass core devices to communicate with AWS IoT and AWS IoT Greengrass. If the AWS IoT policy doesn't exist, the installer creates a permissive AWS IoT policy with this name. You can restrict this policy's permissions for you use case. For more information, see Minimal AWS IoT policy for AWS IoT Greengrass V2 core devices. -
GreengrassV2TokenExchangeRole
. The name of the IAM role that allows the Greengrass core device to get temporary AWS credentials. If the role doesn't exist, the installer creates it and creates and attaches a policy named
. For more information, see Authorize core devices to interact with AWS services.GreengrassV2TokenExchangeRole
Access -
GreengrassCoreTokenExchangeRoleAlias
. The alias to the IAM role that allows the Greengrass core device to get temporary credentials later. If the role alias doesn't exist, the installer creates it and points it to the IAM role that you specify. For more information, see Authorize core devices to interact with AWS services.
Important
On Windows core devices, you must specify
--setup-system-service true
to set up the AWS IoT Greengrass Core software as a system service.The installer prints the following messages if it succeeds:
-
If you specify
--provision
, the installer printsSuccessfully configured Nucleus with provisioned resource details
if it configured the resources successfully. -
If you specify
--deploy-dev-tools
, the installer printsConfigured Nucleus to deploy aws.greengrass.Cli component
if it created the deployment successfully. -
If you specify
--setup-system-service true
, the installer printsSuccessfully set up Nucleus as a system service
if it set up and ran the software as a service. -
If you don't specify
--setup-system-service true
, the installer printsLaunched Nucleus successfully
if it succeeded and ran the software.
-
-
Skip this step if you installed Greengrass nucleus v2.0.4 or later. If you downloaded the latest version of the software, you installed v2.0.4 or later.
Run the following command to set the required file permissions for your AWS IoT Greengrass Core software root folder. Replace
with the root folder that you specified in your installation command, and replace/greengrass/v2
/greengrass
with the parent folder for your root folder.sudo chmod 755
&& sudo chmod 755/greengrass/v2
/greengrass
If you installed the AWS IoT Greengrass Core software as a system service, the installer runs the software for you. Otherwise, you must run the software manually. For more information, see Run the AWS IoT Greengrass Core software.
Note
By default, the IAM role that the installer creates doesn't allow access to component artifacts in S3 buckets. To deploy custom components that define artifacts in Amazon S3, you must add permissions to the role to allow your core device to retrieve component artifacts. For more information, see Allow access to S3 buckets for component artifacts.
If you don't yet have an S3 bucket for component artifacts, you can add these permissions later after you create a bucket.
For more information about how to configure and use the software and AWS IoT Greengrass, see the following:
FIPS compliance first party components
aws.greengrass.Nucleus |
data.iot-fips. |
greengrass-fips. |
|
data.credentials.iot-fips. |
|
aws.greengrass.TokenExchangeService |
data.credentials.iot-fips. |
aws.greengrass.Cli |
|
aws.greengrass.StreamManager |
NoteStream manager does not support AWS IoT Analytics FIPS endpoint |
aws.greengrass.LogManager |
logs-fips.us-east-1 .amazonaws.com |
aws.greengrass.crypto.Pkcs11Provider |
|
aws.greengrass.ShadowManager |
|
aws.greengrass.DockerApplicationManager |
ecr-fips.us-east-1 .amazonaws.com |
aws.greengrass.SecretManager |
secretsmanager-fips.us-east-1 .amazonaws.com |
aws.greengrass.telemetry.NucleusEmitter |
|
aws.greengrass.clientdevices.IPDetector |
|
aws.greengrass.DiskSpooler |