JDBC Based Device Registry Configuration

The JDBC based Device Registry component provides an implementation of Eclipse Hono™’s Device Registration, Credentials and Tenant APIs. Protocol adapters use these APIs to determine a device’s registration status, e.g. if it is enabled and if it is registered with a particular tenant, and to authenticate a device before accepting any data for processing from it. In addition to the above, this Device Registry also provides an implementation of Device Registry Management APIs for managing tenants, registration information and credentials of devices.

The registry is implemented as a Quarkus application, and it uses a JDBC compliant database to persist data. It provides the following features:

  • By default, supports H2 and PostgreSQL
  • Supports different JDBC connections for read-only and read-write operations, to support read-only replicas

Note: The provided container image contains only the H2 and PostgreSQL configuration and JDBC driver. While it is possible to use other JDBC compliant databases, database specific configuration and JDBC driver have to be provided by the user.

Service Configuration

The following table provides an overview of the configuration variables and corresponding system properties for configuring the JDBC based Device Registry.

The configuration uses the section ADAPTER for configurations of the protocol adapter facing services, and the section MANAGEMENT for management facing services. As adapters only require read-only operations, this can be used to direct adapters to services instances, which are backed by read-only replicas. Which can improve performance and availability.

OS Environment Variable
Java System Property
Mandatory Default Description
HONO_REGISTRY_AMQP_BINDADDRESS
hono.registry.amqp.bindAddress
no 127.0.0.1 The IP address of the network interface that the secure AMQP port should be bound to.
See Port Configuration below for details.
HONO_REGISTRY_AMQP_CERTPATH
hono.registry.amqp.certPath
no - The absolute path to the PEM file containing the certificate that the server should use for authenticating to clients. This option must be used in conjunction with HONO_REGISTRY_AMQP_KEYPATH.
Alternatively, the HONO_REGISTRY_AMQP_KEYSTOREPATH option can be used to configure a key store containing both the key as well as the certificate.
HONO_REGISTRY_AMQP_INSECUREPORT
hono.registry.amqp.insecurePort
no - The insecure port the server should listen on for AMQP 1.0 connections.
See Port Configuration below for details.
HONO_REGISTRY_AMQP_INSECUREPORTBINDADDRESS
hono.registry.amqp.insecurePortBindAddress
no 127.0.0.1 The IP address of the network interface that the insecure AMQP port should be bound to.
See Port Configuration below for details.
HONO_REGISTRY_AMQP_INSECUREPORTENABLED
hono.registry.amqp.insecurePortEnabled
no false If set to true the server will open an insecure port (not secured by TLS) using either the port number set via HONO_REGISTRY_AMQP_INSECUREPORT or the default AMQP port number (5672) if not set explicitly.
See Port Configuration below for details.
HONO_REGISTRY_AMQP_KEYPATH
hono.registry.amqp.keyPath
no - The absolute path to the (PKCS8) PEM file containing the private key that the server should use for authenticating to clients. This option must be used in conjunction with HONO_REGISTRY_AMQP_CERTPATH. Alternatively, the HONO_REGISTRY_AMQP_KEYSTOREPATH option can be used to configure a key store containing both the key as well as the certificate.
HONO_REGISTRY_AMQP_KEYSTOREPASSWORD
hono.registry.amqp.keyStorePassword
no - The password required to read the contents of the key store.
HONO_REGISTRY_AMQP_KEYSTOREPATH
hono.registry.amqp.keyStorePath
no - The absolute path to the Java key store containing the private key and certificate that the server should use for authenticating to clients. Either this option or the HONO_REGISTRY_AMQP_KEYPATH and HONO_REGISTRY_AMQP_CERTPATH options need to be set in order to enable TLS secured connections with clients. The key store format can be either JKS or PKCS12 indicated by a .jks or .p12 file suffix respectively.
HONO_REGISTRY_AMQP_NATIVETLSREQUIRED
hono.registry.amqp.nativeTlsRequired
no false The server will probe for OpenSSL on startup if a secure port is configured. By default, the server will fall back to the JVM’s default SSL engine if not available. However, if set to true, the server will fail to start at all in this case.
HONO_REGISTRY_AMQP_PORT
hono.registry.amqp.port
no 5671 The secure port that the server should listen on for AMQP 1.0 connections.
See Port Configuration below for details.
HONO_REGISTRY_AMQP_SECUREPROTOCOLS
hono.registry.amqp.secureProtocols
no TLSv1.3,TLSv1.2 A (comma separated) list of secure protocols (in order of preference) that are supported when negotiating TLS sessions. Please refer to the vert.x documentation for a list of supported protocol names.
HONO_REGISTRY_AMQP_SUPPORTEDCIPHERSUITES
hono.registry.amqp.supportedCipherSuites
no - A (comma separated) list of names of cipher suites (in order of preference) that are supported when negotiating TLS sessions. Please refer to JSSE Cipher Suite Names for a list of supported names.
HONO_REGISTRY_HTTP_AUTHENTICATIONREQUIRED
hono.registry.http.authenticationRequired
no true If set to true the HTTP endpoint of the Device Registry requires clients to authenticate when connecting to the Device Registry. The JDBC based Device Registry currently supports basic authentication and the user credentials are to be stored in the database.
For more information on how to manage users please refer to JDBC Auth Provider.
HONO_REGISTRY_HTTP_BINDADDRESS
hono.registry.http.bindAddress
no 127.0.0.1 The IP address of the network interface that the secure HTTP port should be bound to.
See Port Configuration below for details.
HONO_REGISTRY_HTTP_CERTPATH
hono.registry.http.certPath
no - The absolute path to the PEM file containing the certificate that the server should use for authenticating to clients. This option must be used in conjunction with HONO_REGISTRY_HTTP_KEYPATH.
Alternatively, the HONO_REGISTRY_HTTP_KEYSTOREPATH option can be used to configure a key store containing both the key as well as the certificate.
HONO_REGISTRY_HTTP_DEVICEIDREGEX
hono.registry.http.deviceIdRegex
no ^[a-zA-Z0-9-_]+$ The regular expression to use to validate device ID. Please refer to the java pattern documentation.
HONO_REGISTRY_HTTP_IDLETIMEOUT
hono.registry.http.idleTimeout
no 60 The idle timeout in seconds. A connection will timeout and be closed if no data is received or sent within the idle timeout period. A zero value means no timeout is used.
HONO_REGISTRY_HTTP_INSECUREPORT
hono.registry.http.insecurePort
no - The insecure port the server should listen on for HTTP requests.
See Port Configuration below for details.
HONO_REGISTRY_HTTP_INSECUREPORTBINDADDRESS
hono.registry.http.insecurePortBindAddress
no 127.0.0.1 The IP address of the network interface that the insecure HTTP port should be bound to.
See Port Configuration below for details.
HONO_REGISTRY_HTTP_INSECUREPORTENABLED
hono.registry.http.insecurePortEnabled
no false If set to true the server will open an insecure port (not secured by TLS) using either the port number set via HONO_REGISTRY_HTTP_INSECUREPORT or the default HTTP port number (8080) if not set explicitly.
See Port Configuration below for details.
HONO_REGISTRY_HTTP_KEYPATH
hono.registry.http.keyPath
no - The absolute path to the (PKCS8) PEM file containing the private key that the server should use for authenticating to clients. This option must be used in conjunction with HONO_REGISTRY_HTTP_CERTPATH. Alternatively, the HONO_REGISTRY_HTTP_KEYSTOREPATH option can be used to configure a key store containing both the key as well as the certificate.
HONO_REGISTRY_HTTP_KEYSTOREPASSWORD
hono.registry.http.keyStorePassword
no - The password required to read the contents of the key store.
HONO_REGISTRY_HTTP_KEYSTOREPATH
hono.registry.http.keyStorePath
no - The absolute path to the Java key store containing the private key and certificate that the server should use for authenticating to clients. Either this option or the HONO_REGISTRY_HTTP_KEYPATH and HONO_REGISTRY_HTTP_CERTPATH options need to be set in order to enable TLS secured connections with clients. The key store format can be either JKS or PKCS12 indicated by a .jks or .p12 file suffix respectively.
HONO_REGISTRY_HTTP_MAXPAYLOADSIZE
hono.registry.http.maxPayloadSize
no 16000 The maximum size of an HTTP request body in bytes that is accepted by the registry.
HONO_REGISTRY_HTTP_PORT
hono.registry.http.port
no 8443 The secure port that the server should listen on for HTTP requests.
See Port Configuration below for details.
HONO_REGISTRY_HTTP_SECUREPROTOCOLS
hono.registry.http.secureProtocols
no TLSv1.3,TLSv1.2 A (comma separated) list of secure protocols (in order of preference) that are supported when negotiating TLS sessions. Please refer to the vert.x documentation for a list of supported protocol names.
HONO_REGISTRY_HTTP_SUPPORTEDCIPHERSUITES
hono.registry.http.supportedCipherSuites
no - A (comma separated) list of names of cipher suites (in order of preference) that are supported when negotiating TLS sessions. Please refer to JSSE Cipher Suite Names for a list of supported names.
HONO_REGISTRY_HTTP_TENANTIDREGEX
hono.registry.http.tenantIdRegex
no ^[a-zA-Z0-9-_.]+$ The regular expression to use to validate tenant ID. Please refer to the java pattern documentation.
HONO_REGISTRY_JDBC_ADAPTER_URL
hono.registry.jdbc.adapter.url
yes - The JDBC URL to the database.
HONO_REGISTRY_JDBC_ADAPTER_DRIVERCLASS
hono.registry.jdbc.adapter.driverClass
no The default driver registered for the JDBC URL. The class name of the JDBC driver.
HONO_REGISTRY_JDBC_ADAPTER_USERNAME
hono.registry.jdbc.adapter.username
no - The username used to access the database.
HONO_REGISTRY_JDBC_ADAPTER_PASSWORD
hono.registry.jdbc.adapter.password
no - The password used to access the database.
HONO_REGISTRY_JDBC_ADAPTER_MAXIMUMPOOLSIZE
hono.registry.jdbc.adapter.maximumPoolSize
no 15 The maximum size of the connection pool.
HONO_REGISTRY_JDBC_ADAPTER_MINIMUMPOOLSIZE
hono.registry.jdbc.adapter.minimumPoolSize
no 3 The minimum size of the connection pool.
HONO_REGISTRY_JDBC_ADAPTER_INITIALPOOLSIZE
hono.registry.jdbc.adapter.initialPoolSize
no 3 Number of connections a pool will try to acquire upon startup. Should be between minPoolSize and maxPoolSize.
HONO_REGISTRY_JDBC_ADAPTER_MAXIMUMIDLETIME
hono.registry.jdbc.adapter.maximumIdleTime
no 3600 Seconds a connection can remain pooled but unused before being discarded. Zero means idle connections never expire.
HONO_REGISTRY_JDBC_ADAPTER_MAXIMUMCONNECTIONTIME
hono.registry.jdbc.adapter.maximumConnectionTime
no 30 Maximum wait time in seconds to obtain a connection from the pool before the request fails. A value of zero disables the timeout.
HONO_REGISTRY_JDBC_ADAPTER_VALIDATIONTIME
hono.registry.jdbc.adapter.validationTime
no 30 Interval, in seconds, in which connections in the pool are validated. A value of zero means connection validation is disabled.
HONO_REGISTRY_JDBC_ADAPTER_LEAKTIME
hono.registry.jdbc.adapter.leakTime
no 60 Seconds after which a connection is considered to be leaking if it has not returned to the pool. A value of zero means connection leakage detection is disabled.
HONO_REGISTRY_JDBC_ADAPTER_TABLENAME
hono.registry.jdbc.adapter.tableName
no - The name of the table the datastore uses. If the datastore requires multiple tables, this is the prefix.
HONO_REGISTRY_JDBC_MANAGEMENT_URL
hono.registry.jdbc.management.url
yes - The JDBC URL to the database.
HONO_REGISTRY_JDBC_MANAGEMENT_DRIVERCLASS
hono.registry.jdbc.management.driverClass
no The default driver registered for the JDBC URL. The class name of the JDBC driver.
HONO_REGISTRY_JDBC_MANAGEMENT_USERNAME
hono.registry.jdbc.management.username
no - The username used to access the database.
HONO_REGISTRY_JDBC_MANAGEMENT_PASSWORD
hono.registry.jdbc.management.password
no - The password used to access the database.
HONO_REGISTRY_JDBC_MANAGEMENT_MAXIMUMPOOLSIZE
hono.registry.jdbc.management.maximumPoolSize
no 15 The maximum size of the connection pool.
HONO_REGISTRY_JDBC_MANAGEMENT_MINIMUMPOOLSIZE
hono.registry.jdbc.management.minimumPoolSize
no 3 The minimum size of the connection pool.
HONO_REGISTRY_JDBC_MANAGEMENT_INITIALPOOLSIZE
hono.registry.jdbc.management.initialPoolSize
no 3 Number of connections a pool will try to acquire upon startup. Should be between minPoolSize and maxPoolSize.
HONO_REGISTRY_JDBC_MANAGEMENT_MAXIMUMIDLETIME
hono.registry.jdbc.management.maximumIdleTime
no 3600 Seconds a connection can remain pooled but unused before being discarded. Zero means idle connections never expire.
HONO_REGISTRY_JDBC_MANAGEMENT_MAXIMUMCONNECTIONTIME
hono.registry.jdbc.management.maximumConnectionTime
no 30 Maximum wait time in seconds to obtain a connection from the pool before the request fails. A value of zero disables the timeout.
HONO_REGISTRY_JDBC_MANAGEMENT_VALIDATIONTIME
hono.registry.jdbc.management.validationTime
no 30 Interval, in seconds, in which connections in the pool are validated. A value of zero means connection validation is disabled.
HONO_REGISTRY_JDBC_MANAGEMENT_LEAKTIME
hono.registry.jdbc.management.leakTime
no 60 Seconds after which a connection is considered to be leaking if it has not returned to the pool. A value of zero means connection leakage detection is disabled.
HONO_REGISTRY_JDBC_MANAGEMENT_TABLENAME
hono.registry.jdbc.management.tableName
no - The name of the table the datastore uses. If the datastore requires multiple tables, this is the prefix.
HONO_REGISTRY_SVC_CREDENTIALSTTL
hono.registry.svc.credentialsTtl
no 1m The TTL for credentials responses.
HONO_REGISTRY_SVC_HASHALGORITHMSWHITELIST
hono.registry.svc.hashAlgorithmsWhitelist
no empty An array of supported hashing algorithms to be used with the hashed-password type of credentials. When not set, all values will be accepted.
HONO_REGISTRY_SVC_MAXBCRYPTCOSTFACTOR
hono.registry.svc.maxBcryptCostFactor
no 10 The maximum cost factor that is supported in password hashes using the BCrypt hash function. This limit is enforced by the device registry when adding or updating corresponding credentials. Increasing this number allows for potentially more secure password hashes to be used. However, the time required to compute the hash increases exponentially with the cost factor.
HONO_REGISTRY_SVC_MAXDEVICESPERTENANT
hono.registry.svc.maxDevicesPerTenant
no -1 The number of devices that can be registered for each tenant. It is an error to set this property to a value < -1. The value -1 indicates that no limit is set.
HONO_REGISTRY_SVC_REGISTRATIONTTL
hono.registry.svc.registrationTtl
no 1m The TTL for registrations responses.
HONO_REGISTRY_SVC_USERNAMEPATTERN
hono.registry.svc.usernamePattern
no ^[a-zA-Z0-9-_=\\.]+$ The regular expression to use for validating authentication identifiers (user names) of hashed-password credentials.
HONO_TENANT_JDBC_ADAPTER_URL
hono.tenant.jdbc.adapter.url
yes - The JDBC URL to the database.
HONO_TENANT_JDBC_ADAPTER_DRIVERCLASS
hono.tenant.jdbc.adapter.driverClass
no The default driver registered for the JDBC URL. The class name of the JDBC driver.
HONO_TENANT_JDBC_ADAPTER_USERNAME
hono.tenant.jdbc.adapter.username
no - The username used to access the database.
HONO_TENANT_JDBC_ADAPTER_PASSWORD
hono.tenant.jdbc.adapter.password
no - The password used to access the database.
HONO_TENANT_JDBC_ADAPTER_MAXIMUMPOOLSIZE
hono.tenant.jdbc.adapter.maximumPoolSize
no 15 The maximum size of the connection pool.
HONO_TENANT_JDBC_ADAPTER_MINIMUMPOOLSIZE
hono.tenant.jdbc.adapter.minimumPoolSize
no 3 The minimum size of the connection pool.
HONO_TENANT_JDBC_ADAPTER_INITIALPOOLSIZE
hono.tenant.jdbc.adapter.initialPoolSize
no 3 Number of connections a pool will try to acquire upon startup. Should be between minPoolSize and maxPoolSize.
HONO_TENANT_JDBC_ADAPTER_MAXIMUMIDLETIME
hono.tenant.jdbc.adapter.maximumIdleTime
no 3600 Seconds a connection can remain pooled but unused before being discarded. Zero means idle connections never expire.
HONO_TENANT_JDBC_ADAPTER_MAXIMUMCONNECTIONTIME
hono.tenant.jdbc.adapter.maximumConnectionTime
no 30 Maximum wait time in seconds to obtain a connection from the pool before the request fails. A value of zero disables the timeout.
HONO_TENANT_JDBC_ADAPTER_VALIDATIONTIME
hono.tenant.jdbc.adapter.validationTime
no 30 Interval, in seconds, in which connections in the pool are validated. A value of zero means connection validation is disabled.
HONO_TENANT_JDBC_ADAPTER_LEAKTIME
hono.tenant.jdbc.adapter.leakTime
no 60 Seconds after which a connection is considered to be leaking if it has not returned to the pool. A value of zero means connection leakage detection is disabled.
HONO_TENANT_JDBC_ADAPTER_TABLENAME
hono.tenant.jdbc.adapter.tableName
no - The name of the table the datastore uses. If the datastore requires multiple tables, this is the prefix.
HONO_TENANT_JDBC_MANAGEMENT_URL
hono.tenant.jdbc.management.url
yes - The JDBC URL to the database.
HONO_TENANT_JDBC_MANAGEMENT_DRIVERCLASS
hono.tenant.jdbc.management.driverClass
no The default driver registered for the JDBC URL. The class name of the JDBC driver.
HONO_TENANT_JDBC_MANAGEMENT_USERNAME
hono.tenant.jdbc.management.username
no - The username used to access the database.
HONO_TENANT_JDBC_MANAGEMENT_PASSWORD
hono.tenant.jdbc.management.password
no - The password used to access the database.
HONO_TENANT_JDBC_MANAGEMENT_MAXIMUMPOOLSIZE
hono.tenant.jdbc.management.maximumPoolSize
no 15 The maximum size of the connection pool.
HONO_TENANT_JDBC_MANAGEMENT_MINIMUMPOOLSIZE
hono.tenant.jdbc.management.minimumPoolSize
no 3 The minimum size of the connection pool.
HONO_TENANT_JDBC_MANAGEMENT_INITIALPOOLSIZE
hono.tenant.jdbc.management.initialPoolSize
no 3 Number of connections a pool will try to acquire upon startup. Should be between minPoolSize and maxPoolSize.
HONO_TENANT_JDBC_MANAGEMENT_MAXIMUMIDLETIME
hono.tenant.jdbc.management.maximumIdleTime
no 3600 Seconds a connection can remain pooled but unused before being discarded. Zero means idle connections never expire.
HONO_TENANT_JDBC_MANAGEMENT_MAXIMUMCONNECTIONTIME
hono.tenant.jdbc.management.maximumConnectionTime
no 30 Maximum wait time in seconds to obtain a connection from the pool before the request fails. A value of zero disables the timeout.
HONO_TENANT_JDBC_MANAGEMENT_VALIDATIONTIME
hono.tenant.jdbc.management.validationTime
no 30 Interval, in seconds, in which connections in the pool are validated. A value of zero means connection validation is disabled.
HONO_TENANT_JDBC_MANAGEMENT_LEAKTIME
hono.tenant.jdbc.management.leakTime
no 60 Seconds after which a connection is considered to be leaking if it has not returned to the pool. A value of zero means connection leakage detection is disabled.
HONO_TENANT_JDBC_MANAGEMENT_TABLENAME
hono.tenant.jdbc.management.tableName
no - The name of the table the datastore uses. If the datastore requires multiple tables, this is the prefix.
HONO_TENANT_SVC_TENANTTTL
hono.tenant.service.tenantTtl
no 1m The TTL for tenant responses.

The variables only need to be set if the default value does not match your environment.

In addition to the options described in the table above, this component supports the following standard configuration options:

Port Configuration

The device registry supports configuration of both an AMQP based endpoint exposing the Tenant, Device Registration and Credentials APIs as well as an HTTP based endpoint providing resources for managing tenants, registration information and credentials as defined by the Registry Management API. Both endpoints can be configured to listen for connections on

  • a secure port only (default) or
  • an insecure port only or
  • both a secure and an insecure port (dual port configuration)

The registry will fail to start if none of the ports is configured properly.

The following sections apply to configuring both the AMQP and the HTTP endpoint. The environment variables to use for configuring the HTTP endpoint are the same as the ones for the AMQP endpoint, substituting _AMQP_ with _HTTP_, e.g. HONO_REGISTRY_HTTP_KEYPATH instead of HONO_REGISTRY_AMQP_KEYPATH.

Secure Port Only

The server needs to be configured with a private key and certificate in order to open a TLS secured port.

There are two alternative ways for doing so:

  1. Setting the HONO_REGISTRY_AMQP_KEYSTOREPATH and the HONO_REGISTRY_AMQP_KEYSTOREPASSWORD variables in order to load the key & certificate from a password protected key store, or
  2. setting the HONO_REGISTRY_AMQP_KEYPATH and HONO_REGISTRY_AMQP_CERTPATH variables in order to load the key and certificate from two separate PEM files in PKCS8 format.

When starting up, the server will bind a TLS secured socket to the default secure port (5671 for AMQP and 8443 for HTTP). The port number can also be set explicitly using the HONO_REGISTRY_AMQP_PORT variable.

The HONO_REGISTRY_AMQP_BINDADDRESS variable can be used to specify the network interface that the port should be exposed on. By default, the port is bound to the loopback device only, i.e. the port will only be accessible from the local host. Setting this variable to 0.0.0.0 will let the port being bound to all network interfaces (be careful not to expose the port unintentionally to the outside world).

Insecure Port Only

The secure port will mostly be required for production scenarios. However, it might be desirable to expose a non-TLS secured port instead, e.g. for testing purposes. In any case, the non-secure port needs to be explicitly enabled either by

  • explicitly setting HONO_REGISTRY_AMQP_INSECUREPORT to a valid port number, or
  • implicitly configuring the default port (5672 for AMQP and 8080 for HTTP) to be used by setting HONO_REGISTRY_AMQP_INSECUREPORTENABLED to true.

The server issues a warning on the console if one of the insecure ports is set to the corresponding default secure port.

The HONO_REGISTRY_AMQP_INSECUREPORTBINDADDRESS variable can be used to specify the network interface that the port should be exposed on. By default, the port is bound to the loopback device only, i.e. the port will only be accessible from the local host. This variable might be used to e.g. expose the non-TLS secured port on a local interface only, thus providing easy access from within the local network, while still requiring encrypted communication when accessed from the outside over public network infrastructure.

Setting this variable to 0.0.0.0 will let the port being bound to all network interfaces (be careful not to expose the port unintentionally to the outside world).

Dual Port

In test setups and some production scenarios Hono server may be configured to open one secure and one insecure port at the same time.

This is achieved by configuring both ports correctly (see above). The server will fail to start if both ports are configured to use the same port number.

Since the secure port may need different visibility in the network setup compared to the secure port, it has its own binding address HONO_REGISTRY_AMQP_INSECUREPORTBINDADDRESS. This can be used to narrow the visibility of the insecure port to a local network e.g., while the secure port may be visible worldwide.

Ephemeral Ports

Both the secure as well as the insecure port numbers may be explicitly set to 0. The registry will then use arbitrary (unused) port numbers determined by the operating system during startup.

Authentication Service Connection Configuration

The service requires a connection to an implementation of Hono’s Authentication API in order to authenticate and authorize client requests.

The connection is configured according to the Hono Client Configuration where the ${PREFIX} is set to HONO_AUTH. The properties for configuring the client’s response caching will be ignored because Hono’s Authentication Service does not allow caching of responses.

In addition to the standard client configuration properties, the following properties are supported:

OS Environment Variable
Java System Property
Mandatory Default Description
HONO_AUTH_JWKSENDPOINTPOLLINGINTERVAL
hono.auth.jwksEndpointPollingInterval
no PT5M The interval at which the JWK set should be retrieved from the Authentication service. The format used is the standard java.time.Duration format.
HONO_AUTH_JWKSENDPOINTPORT
hono.auth.jwksEndpointPort
no 8088 The port of the Authentication service’s HTTP endpoint to retrieve the JWK set from.
HONO_AUTH_JWKSENDPOINTTLSENABLED
hono.auth.jwksEndpointTlsEnabled
no false Indicates if TLS should be used to retrieve the JWK set from the Authentication service.
HONO_AUTH_JWKSENDPOINTURI
hono.auth.jwksEndpointUri
no /validating-keys The URI of the Authentication service’s HTTP endpoint to retrieve the JWK set from.
HONO_AUTH_VALIDATION_AUDIENCE
hono.auth.validation.audience
no - The value to expect to find in a token’s aud claim. If set, the token will not be trusted if the value in the claim does not match the value configured using this property.
HONO_AUTH_VALIDATION_CERTPATH
hono.auth.validation.certPath
no - The absolute path to the PEM file containing the public key that the service should use for validating tokens issued by the Authentication service. Alternatively, a symmetric key can be used for validating tokens by setting the HONO_AUTH_VALIDATION_SHAREDSECRET variable. If none of these variables is set, the service will try to retrieve a JWK set containing the key(s) from the Authentication server.
HONO_AUTH_VALIDATION_ISSUER
hono.auth.validation.issuer
yes https://hono.eclipse.org/auth-server The value to expect to find in a token’s iss claim. The token will not be trusted if the value in the claim does not match the value configured using this property.
HONO_AUTH_VALIDATION_SHAREDSECRET
hono.auth.validation.sharedSecret
no - A string to derive a symmetric key from which will be used for validating tokens issued by the Authentication service. The key is derived from the string by using the bytes of the String’s UTF8 encoding. When setting the validation key using this variable, the Authentication service must be configured with the same key. Alternatively, an X.509 certificate can be used for validating tokens by setting the HONO_AUTH_VALIDATION_CERTPATH variable. If none of these variables is set, the service will try to retrieve a JWK set containing the key(s) from the Authentication server.

Metrics Configuration

See Monitoring & Tracing Admin Guide for details on how to configure the reporting of metrics.

Messaging Configuration

The Device Registry uses a connection to an AMQP 1.0 Messaging Network, an Apache Kafka cluster and/or Google Pub/Sub to

  • send Device Provisioning Notification event messages to convey provisioning related changes regarding a device, to be received by downstream applications,
  • send notification messages about changes to tenant/device/credentials data, to be processed by other Hono components.

For the event messages a connection to a Apache Kafka cluster is used by default, if configured. If more than one kind of messaging is configured, the decision which one to use is done according to the Tenant Configuration.

For notification messages, the Kafka connection is used by default, if configured. Otherwise the AMQP messaging network or Google Pub/Sub is used.

AMQP 1.0 Messaging Network Connection Configuration

The connection to the AMQP 1.0 Messaging Network is configured according to the Hono Client Configuration with HONO_MESSAGING being used as ${PREFIX}. Since there are no responses being received, the properties for configuring response caching can be ignored.

Kafka based Messaging Configuration

The connection to an Apache Kafka cluster can be configured according to the Hono Kafka Client Configuration.

The following table shows the prefixes to be used to individually configure the Kafka clients used by the Device Registry. The individual client configuration is optional, a minimal configuration may only contain a common client configuration consisting of properties prefixed with HONO_KAFKA_COMMONCLIENTCONFIG_ and hono.kafka.commonClientConfig. respectively.

OS Environment Variable Prefix
Java System Property Prefix
Description
HONO_KAFKA_EVENT_PRODUCERCONFIG_
hono.kafka.event.producerConfig.
Configures the Kafka producer that publishes event messages.
HONO_KAFKA_NOTIFICATION_PRODUCERCONFIG_
hono.kafka.notification.producerConfig.
Configures the Kafka producer that publishes notification messages about changes to tenant/device/credentials data.

Google Pub/Sub Messaging Configuration

The connection to Google Pub/Sub is configured according to the Google Pub/Sub Messaging Configuration.