Skip to main content

General

Export to AWS IoT Core

Secure MQTT export to AWS IoT Core with X.509 certificate authentication.

Secure export to AWS IoT Core using MQTT with X.509 certificate authentication. Integrates seamlessly with AWS IoT services like Device Shadows, Thing Registry, and Rules Engine for cloud-based IoT solutions.

open_in_new

AWS IoT Core Documentation

amazon.com/iot-core

Configuration Parameters

ParameterRequiredTypeDefaultDescription
EndPointYesstring-AWS IoT Core endpoint (e.g., abcdef12345678-ats.iot.us-east-1.amazonaws.com).
ClientIdYesstring-Unique client identifier for the connection.
CertificateThumbprintYesstring-Reference to the client certificate stored in the Certificate Store.
PortNoint8883MQTT over TLS port (default is 8883).
UseTlsNobooltrueEnable TLS encryption (should remain true for AWS IoT).
ValueModeNostringMeasureValueFieldsData serialization mode: MeasureValueFields or siemens.
QualityOfServiceLevelNoint1MQTT QoS level (0, 1, 2).
MaxReconnectAttemptsNoint10Maximum reconnect attempts before backing off.
InitialReconnectDelayMsNoint1000Initial reconnect delay in milliseconds.
MaxReconnectDelayMsNoint30000Max reconnect delay in milliseconds.
MessageBatchTimeoutMsNoint500Batch window for outbound publish.
MaxBatchSizeNoint50Max messages per batch.
HealthCheckIntervalSecNoint5Connection health check interval.
ConnectionTimeoutSecNoint5MQTT connection timeout.

[!NOTE] AWS IoT Core requires a valid client certificate with its private key. Upload the certificate to the Certificate Store first, then assign it from the target parameter editor. Proxus generates the runtime payload automatically.

Certificate Assignment Flow

  1. Open Administration → Certificate Store
  2. Import the AWS client certificate as PFX or PEM + private key
  3. Open the AWS IoT Core outbound connector
  4. Use Edit Parameters and select the certificate from the certificate picker
  5. Save the connector

If the selected certificate does not include a private key, the connector cannot establish TLS authentication with AWS IoT Core.

Message Format

Each payload entry is sent as a flat JSON message. The format matches the Azure IoT connector for consistency.

Default Mode (MeasureValueFields)

{
  "deviceId": "dev-1",
  "deviceName": "sensor-1",
  "measureName": "Temperature",
  "timestamp": "2024-02-01T00:00:00.000Z",
  "measureValueType": "DOUBLE",
  "measureValueDouble": 25.5
}

Siemens Mode (siemens)

{
  "deviceId": "dev-22",
  "deviceName": "line-2",
  "measureName": "Status",
  "timestamp": "2024-02-02T10:15:30.000Z",
  "measureValueType": "BOOLEAN",
  "value": "true"
}

Internal Behavior

Authentication & Security

  • X.509 Certificates: Uses AWS IoT Core's recommended X.509 certificate authentication
  • TLS 1.2: Mandatory TLS encryption with certificate validation
  • Device Identity: Each connection represents a unique IoT device in the registry

Performance Features

  • MQTT Protocol: Uses standard MQTT for efficient IoT communication
  • Message Serialization: Flexible data serialization supporting flat message structures
  • Connection Management: Robust connection handling with automatic reconnection
  • AWS Service Integration: Ready for integration with AWS IoT Rules, Lambda triggers, and DynamoDB