Home
%3CLINGO-SUB%20id%3D%22lingo-sub-1095274%22%20slang%3D%22en-US%22%3EPlan%20for%20changes%3A%20Azure%20Sphere%20February%20release%20-%20Part%202%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1095274%22%20slang%3D%22en-US%22%3E%3CP%3EThis%20is%20the%20second%20in%20a%20series%20of%20posts%20about%20changes%20coming%20in%20the%20February%20release%20of%20Azure%20Sphere.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20we%20mentioned%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Finternet-of-things%2Fplan-for-changes-coming-in-the-azure-sphere-february-release%2Fba-p%2F1075304%22%20target%3D%22_self%22%3Epreviously%3C%2FA%3E%2C%20we%20are%20making%20a%20number%20of%20enhancements%20to%20our%20OS%20and%20SDK%20to%20further%20strengthen%20the%20security%20of%20devices%20at%20customer%20sites%20and%20ensure%20supportability%20from%20GA%20onward.%20Although%20our%20goal%20is%20to%20avoid%20the%20introduction%20of%20breaking%20changes%20and%20incompatibility%20between%20releases%2C%20our%20transition%20from%20Public%20Preview%20to%20the%20General%20Availability%20(GA)%20release%20requires%20several%20important%20updates.%20In%20a%20few%20situations%2C%20you%20will%20need%20to%20make%20changes%20to%20ensure%20your%20devices%20and%20applications%20continue%20to%20work%20as%20intended.%20Thank%20you%20very%20much%20for%20your%20support%20in%20Public%20Preview%20and%20for%20helping%20us%20deliver%20a%20great%20GA%20product.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ETighter%20security%20for%20deployed%20devices%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EStarting%20with%20the%20February%20release%2C%20connected%20device%20manufacturers%20and%20OEMs%20can%20disable%20computer-to-device%20communications%20over%20USB%20to%20prevent%20malicious%20use%20by%20those%20who%20have%20physical%20access%20to%20the%20device.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EDisabling%20such%20access%20is%20part%20of%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure-sphere%2Fhardware%2Ffactory-floor-tasks%23finalize-the-azure-sphere-device%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Edevice%20finalization%3C%2FA%3E.%20Finalization%20is%20typically%20performed%20on%20the%20factory%20floor%20before%20the%20manufacturer%20ships%20the%20device%20to%20an%20end%20user%20site%2C%20but%20some%20dev%20kit%20manufacturers%20may%20finalize%20devices%20as%20well.%20After%20finalization%2C%20a%20user%20will%20be%20able%20to%20get%20the%20device%20ID%20over%20a%20USB%20connection.%20All%20other%20operations%20require%20a%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure-sphere%2Fapp-development%2Fapplications-overview%23device-capabilities%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Edevice%20capability%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EField%20support%20technicians%20who%20need%20USB%20communications%20for%20set-up%20and%20servicing%20can%20use%20the%20new%20%3CSTRONG%3EfieldServicing%3C%2FSTRONG%3E%20capability.%20This%20capability%20provides%20temporary%20access%20over%20USB.%20See%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure-sphere%2Fproduct-overview%2Fupcoming-changes%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EUpcoming%20Changes%3C%2FA%3E%20for%20details.%20For%20application%20developers%2C%20the%20%3CSTRONG%3Eazsphere%20device%20enable-development%3C%2FSTRONG%3E%20command%20(which%20applies%20the%20%3CSTRONG%3EappDevelopment%3C%2FSTRONG%3E%20capability)%20will%20continue%20to%20work%20as%20in%20preview%20releases.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ERemoval%20of%20default%20CA%20certificates%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EPreview%20releases%20of%20Azure%20Sphere%20included%20several%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure-sphere%2Fapp-development%2Fcurl%23default-ca-certificates%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3ECA%20certificates%3C%2FA%3E%20for%20use%20in%20authenticating%20HTTPS%20servers%2C%20and%20the%20cURL%20library%20was%20configured%20to%20look%20for%20these%20certificates%20on%20the%20device.%20To%20provide%20a%20more%20sustainable%20security%20environment%2C%20the%20Azure%20Sphere%20OS%20will%20no%20longer%20contain%20these%20certificates%20starting%20with%20the%20February%20release.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EApplications%20that%20rely%20on%20the%20presence%20of%20one%20or%20more%20of%20these%20default%20certificates%20will%20require%20changes.%20To%20authenticate%20a%20server%2C%20you%E2%80%99ll%20need%20to%20add%20the%20required%20certificate%20to%20the%20application%20image%20package.%20For%20details%2C%20see%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure-sphere%2Fapp-development%2Fcurl%23server-authentication%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EServer%20Authentication%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EDeprecation%20of%20support%20for%20Visual%20Studio%202017%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EDevelopment%20of%20Azure%20Sphere%20applications%20with%20Visual%20Studio%202017%20will%20no%20longer%20be%20supported%20starting%20with%20the%20February%20release.%20We%20released%20support%20for%20Visual%20Studio%20Code%20and%20Linux%20in%20the%20fall%20of%202019%2C%20and%20we%20continue%20to%20support%20Visual%20Studio%202019%2C%20which%20provides%20enhanced%20support%20for%20CMake.%3C%2FP%3E%0A%3CP%3EOn%20Windows%2C%20you%20can%20compile%2C%20build%2C%20and%20debug%20Azure%20Sphere%20apps%20with%20Visual%20Studio%202019%2C%20Visual%20Studio%20Code%2C%20or%20on%20the%20command%20line.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOn%20Linux%2C%20you%20can%20compile%2C%20build%2C%20and%20debug%20Azure%20Sphere%20apps%20with%20Visual%20Studio%20Code%2C%20or%20on%20the%20command%20line.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EVerify%20your%20apps%20with%20the%20Retail%20Evaluation%20OS%20feed%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhen%20the%20GA%20release%20of%20the%20OS%20is%20ready%2C%20we%20will%20make%20it%20available%20on%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure-sphere%2Fdeployment%2Fdeployment-microsoft-feeds%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3ERetail%20Evaluation%20OS%20feed%3C%2FA%3E%20at%20least%2014%20calendar%20days%20before%20it%20is%20released%20to%20the%20Retail%20OS%20feed.%20Please%20plan%20to%20verify%20your%20scenarios%20against%20the%20OS%3B%20this%20is%20the%20best%20way%20to%20ensure%20compatibility%20with%20the%20forthcoming%20OS%20before%20its%20Retail%20release.%20Be%20aware%20that%20you%20might%20need%20to%20modify%20your%20procedures%20or%20applications.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20will%20provide%20additional%20information%20about%20upcoming%20changes%20through%20the%20IoT%20Blog%20on%20Tech%20Community%20and%20in%20the%20Azure%20Sphere%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure-sphere%2Fproduct-overview%2Fupcoming-changes%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eonline%20documentation%3C%2FA%3E%20as%20GA%20nears%20and%20we%20develop%20detailed%20guidance.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1095274%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F138549i8042672ED8F05399%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Code.png%22%20title%3D%22Code.png%22%20%2F%3E%3C%2FSPAN%3EThis%20is%20the%20second%20in%20a%20series%20of%20posts%20about%20changes%20coming%20in%20the%20February%20release%20of%20Azure%20Sphere.%20We%20are%20making%20a%20number%20of%20enhancements%20to%20our%20OS%20and%20SDK%20to%20further%20strengthen%20the%20security%20of%20devices%20at%20customer%20sites%20and%20ensure%20supportability.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1095274%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3Eazure%20sphere%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EAzure%20Sphere%20updates%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Regular Visitor

This is the second in a series of posts about changes coming in the February release of Azure Sphere.

 

As we mentioned previously, we are making a number of enhancements to our OS and SDK to further strengthen the security of devices at customer sites and ensure supportability from GA onward. Although our goal is to avoid the introduction of breaking changes and incompatibility between releases, our transition from Public Preview to the General Availability (GA) release requires several important updates. In a few situations, you will need to make changes to ensure your devices and applications continue to work as intended. Thank you very much for your support in Public Preview and for helping us deliver a great GA product.

 

Tighter security for deployed devices

 

Starting with the February release, connected device manufacturers and OEMs can disable computer-to-device communications over USB to prevent malicious use by those who have physical access to the device.

 

Disabling such access is part of device finalization. Finalization is typically performed on the factory floor before the manufacturer ships the device to an end user site, but some dev kit manufacturers may finalize devices as well. After finalization, a user will be able to get the device ID over a USB connection. All other operations require a device capability.

 

Field support technicians who need USB communications for set-up and servicing can use the new fieldServicing capability. This capability provides temporary access over USB. See Upcoming Changes for details. For application developers, the azsphere device enable-development command (which applies the appDevelopment capability) will continue to work as in preview releases.

 

Removal of default CA certificates

 

Preview releases of Azure Sphere included several CA certificates for use in authenticating HTTPS servers, and the cURL library was configured to look for these certificates on the device. To provide a more sustainable security environment, the Azure Sphere OS will no longer contain these certificates starting with the February release.

 

Applications that rely on the presence of one or more of these default certificates will require changes. To authenticate a server, you’ll need to add the required certificate to the application image package. For details, see Server Authentication.

 

Deprecation of support for Visual Studio 2017

 

Development of Azure Sphere applications with Visual Studio 2017 will no longer be supported starting with the February release. We released support for Visual Studio Code and Linux in the fall of 2019, and we continue to support Visual Studio 2019, which provides enhanced support for CMake.

On Windows, you can compile, build, and debug Azure Sphere apps with Visual Studio 2019, Visual Studio Code, or on the command line.

 

On Linux, you can compile, build, and debug Azure Sphere apps with Visual Studio Code, or on the command line.

 

Verify your apps with the Retail Evaluation OS feed

 

When the GA release of the OS is ready, we will make it available on the Retail Evaluation OS feed at least 14 calendar days before it is released to the Retail OS feed. Please plan to verify your scenarios against the OS; this is the best way to ensure compatibility with the forthcoming OS before its Retail release. Be aware that you might need to modify your procedures or applications.

 

We will provide additional information about upcoming changes through the IoT Blog on Tech Community and in the Azure Sphere online documentation as GA nears and we develop detailed guidance.