Documentation Index
Fetch the complete documentation index at: https://mintlify.com/lamassuiot/lamassuiot/llms.txt
Use this file to discover all available pages before exploring further.
Device Management
Lamassu’s Device Manager service provides comprehensive device lifecycle management, tracking device identities, certificate bindings, and operational status for IoT deployments at scale.Device Identity Model
Devices in Lamassu are identified by unique IDs and maintain their cryptographic identity through certificate slots:Core Device Properties
- ID — Globally unique device identifier (e.g.,
device-001, UUID, serial number) - Tags — Flexible labels for device classification and grouping
- Status — Current operational status (see Device Lifecycle States below)
- Metadata — Key-value map for custom attributes and integration data
- DMSOwner — ID of the DMS (Device Management Service) responsible for this device
- CreationTimestamp — When the device was first registered in Lamassu
Device IDs should be stable, globally unique identifiers. Common choices include hardware serial numbers, UUIDs, or MAC addresses.
Device Lifecycle States
Devices transition through several states during their operational lifetime:Status Definitions
NO_IDENTITY
Device is registered but has no identity certificate. This is the initial state after device registration. Actions: Provision the device through EST enrollment or manual certificate bindingACTIVE
Device has a valid identity certificate and is fully operational. Characteristics:- Identity certificate is within validity period
- Certificate is not revoked
- Device can authenticate to services
RENEWAL_PENDING
Device certificate has entered the preventive renewal window (typically 60-90 days before expiration). Actions: Device should re-enroll to obtain a new certificate before the current one expiresEXPIRING_SOON
Device certificate has entered the critical renewal window (typically 7-30 days before expiration). Actions: Immediate re-enrollment required. Generate alerts and notifications.EXPIRED
Device certificate has passed its expiration date. Actions:- Device cannot authenticate with expired certificate
- Re-enrollment required (may need special handling if DMS doesn’t allow expired renewal)
- Consider device recovery procedures
REVOKED
Device certificate has been revoked. Reasons for revocation:- Device compromise suspected
- Device decommissioned
- Certificate mis-issuance
- Key compromise
DECOMMISSIONED
Device has been permanently retired from service. Characteristics:- Certificate is revoked
- Device should not re-enroll
- Historical data is retained for audit purposes
Certificate Slots
Lamassu uses a slot-based architecture to manage device certificates and cryptographic secrets:Identity Slot
The IdentitySlot is the primary certificate slot that establishes device identity:- Type:
Slot[string] - Contains: Certificate serial numbers (strings)
- Purpose: Device authentication and identity
- Required: Yes (device has NO_IDENTITY status without it)
Extra Slots
Devices can have additional certificate slots for specific purposes:- Type:
map[string]*Slot[any] - Use cases:
- TLS client certificates
- TLS server certificates (for edge gateways)
- Code signing certificates
- Encryption certificates
- Application-specific certificates
Extra slots enable devices to hold multiple certificates for different purposes, managed independently with separate lifecycles.
Slot Status States
Each slot maintains its own status:- ACTIVE — Certificate is valid and in use
- RENEWAL_PENDING — In preventive renewal window
- EXPIRING_SOON — In critical renewal window
- EXPIRED — Certificate has expired
- REVOKED — Certificate has been revoked
Secret Types
Slots can contain different types of cryptographic secrets:- x509 — X.509 certificates (most common)
- SSH_KEY — SSH public keys
- TOKEN — Authentication tokens
- OTHER — Custom secret types
Versioned Secrets
Slots maintain multiple versions of secrets:- Graceful certificate rotation
- Rollback capability
- Historical tracking
- Overlap periods during renewal
Device Events
Lamassu tracks device lifecycle events for audit and troubleshooting:Event Types
CREATED
Device was registered in the system. Trigger: Device created via API or pre-registrationPROVISIONED
Device received its first identity certificate. Trigger: Successful EST enrollment or certificate bindingRE-PROVISIONED
Device identity certificate was replaced (not renewed). Trigger: Certificate replacement with different key pairRENEWED
Device certificate was renewed. Trigger: EST re-enrollment or manual renewalSHADOW-UPDATED
Device metadata or configuration was updated. Trigger: API update to device propertiesSTATUS-UPDATED
Device status changed. Trigger: Automatic status computation or manual status changeDECOMMISSIONED
Device was decommissioned. Trigger: Device decommissioning operationEvents are stored with timestamps, enabling complete audit trails and operational visibility.
Device Groups
Lamassu supports dynamic device grouping based on filter criteria:Use Cases
- Organizational grouping — By department, location, or business unit
- Functional grouping — By device type, firmware version, or capability
- Operational grouping — By status, certificate expiration, or health
- Policy application — Apply policies to groups rather than individual devices
Hierarchical Groups
Device groups can be nested using theParentID field:
DMS Ownership
Each device is owned by a Device Management Service (DMS):- DMSOwner field stores the DMS ID
- DMS controls enrollment policies and settings
- DMS determines which CA issues device certificates
- DMS manages re-enrollment and renewal policies
DMS Attachment Metadata
CA certificates can be attached to devices with authorization tracking:- Key:
lamassu.io/ra/attached-to - Value:
CAAttachedToDeviceobject
Device Statistics
Lamassu provides aggregated device statistics:Use statistics endpoints to monitor fleet health and identify devices requiring attention.
Device Metadata
The flexible metadata field supports custom device attributes:Common Metadata Fields
- Hardware information — Model, version, capabilities
- Software versions — Firmware, OS, application versions
- Location — Physical or logical location
- Ownership — Team, department, or individual owner
- Deployment — Deployment date, environment, purpose
- Integration IDs — External system identifiers
Related API Endpoints
GET /v2/devices— List devices with filteringPOST /v2/devices— Register a new deviceGET /v2/devices/{deviceId}— Get device detailsPATCH /v2/devices/{deviceId}— Update device metadataDELETE /v2/devices/{deviceId}— Decommission a deviceGET /v2/devices/{deviceId}/events— Get device event historyGET /v2/stats/devices— Get device statisticsGET /v2/device-groups— List device groupsPOST /v2/device-groups— Create device group
Best Practices
Device Registration
- Pre-register devices when possible for tighter security control
- Use stable identifiers that don’t change across device lifecycle
- Populate metadata at registration time for better tracking
- Apply tags for classification and grouping
Certificate Management
- Monitor renewal windows and alert on EXPIRING_SOON status
- Automate re-enrollment using EST protocol
- Plan for failures — handle devices that miss renewal windows
- Track versions — maintain certificate history in slots
Operational Monitoring
- Track status distribution to identify fleet health trends
- Alert on status changes especially to EXPIRED or REVOKED
- Review event logs for troubleshooting and compliance
- Use device groups for bulk operations and policy application
Metadata Strategy
- Define metadata schema for your organization
- Enforce required fields through automation or workflows
- Index important fields for filtering and search
- Version metadata for historical tracking
Decommissioning
- Revoke certificates before decommissioning
- Document reason in events or metadata
- Retain audit data per compliance requirements
- Update external systems that reference the device
Integration Points
Cloud Connectors
Device data can be synchronized with cloud platforms:- AWS IoT — Sync device registry with AWS IoT Core
- Azure IoT Hub — Integration via custom connectors
- Custom platforms — Use webhooks and events
Event Bus
Device events are published to the event bus:- Subscribe to device lifecycle events
- Trigger workflows on status changes
- Integrate with monitoring and alerting systems
Next Steps
Enrollment
Learn how devices obtain certificates through EST
Certificate Authorities
Understand CA management and certificate issuance
Device Lifecycle Guide
Practical guide to managing device lifecycles
EST Enrollment Guide
Set up automated device enrollment
