Skip to content
Phteven Space
TwitterGithub

AWS IOT Custom Authorizer

AWS, IOT, Python, Arduino5 min read

Link to Repo

If you want to skip the article, code and cloudformation documents as well as minimal instructions are located here.

Background

There are some cases where using the standard x509 certificate based authentication can be a bit of a pain for some IOT use cases - A great example of this is if you want to integrate Tasmota with AWS IOT.

AWS provided an alternate way to authenticate called Custom Authentication, using an AWS IOT Custom Authorizer. This essentially allows you to use standard MQTT username and password authentication. To use this, you must implement your own AWS Lambda function to control your authentication (is this combination of client/username/password correct) and authorization (what set of AWS IOT Policies you should have).

Issues I faced

When I was trying to get this going, I ran into a few issues:

  1. The official documentation had a lot of "Run this CLI command" instructions without really going into a lot of depth.
  2. There was minimal information out there for how to connect using a real world client which made it difficult to try to figure out why things weren't working.
  3. To compound #3, some open source information out there is very out of date (partly due to ATS endpoint changes made by AWS) which lead to me burning a lot of time trying things that had no chance of working.
  4. I couldn't find a single cloudformation'd example for how to run it that I could tweak for my own purposes.

Part of the reason for me writing this post is to try to document what I did, what problems I ran into and provide more of an end-to-end solution along with connection details to help others avoid running into the same issues that I ran into.

Implementation

I chose to use AWS SAM to simplify the deployment of my pipeline, creating This SAM Template with the goal of deploying a serverless design so that it would have minimal cost at the sort of scale that my personal project run at, and would require zero maintenance on my end.

The Lambda Authorizer sees the following data from a client trying to connect via MQTT.

1{
2 "protocolData": {
3 "mqtt": {
4 "username": "USER_NAME",
5 "password": "PASS_WORD",
6 "clientId": "CLIENT_NAME"
7 }
8 },
9 "protocols": [
10 "mqtt"
11 ],
12 "signatureVerified": false,
13 "connectionMetadata": {
14 "id": "d0adaaa7-b22d-4545-923c-68a7ae2e337c"
15 }
16}

One thing that caused me some grief and is explicitly called out in the documentation: The password that comes in via protocolData is base64 encoded, so you need to make sure to take this into account when writing unit tests, and make sure that your comparison function is something like this:

1def check_password(db_creds: DynamoModel, request_creds: MQTTData) -> bool:
2 # Note, password comes in as base64 under normal circumstances
3 return all(
4 [
5 db_creds.Username == request_creds.username,
6 db_creds.Password == b64decode(request_creds.password).decode("utf-8"),
7 ]
8 )

Providing the ground truth for credentials as the code segment above implies is a DynamoDB table. The Table uses Client_ID as a key, allowing me to say "if the client id doesn't exist in the table then it's unauthenticated, if it does exist then validate the username and password supplied.

By making this decision I can have a very simple DynamoDB schema.

1Table:
2 Type: AWS::DynamoDB::Table
3 Properties:
4 KeySchema:
5 - AttributeName: "Client_ID"
6 KeyType: "HASH"
7 AttributeDefinitions:
8 - AttributeName: "Client_ID"
9 AttributeType: "S"
10 ProvisionedThroughput:
11 ReadCapacityUnits: 1
12 WriteCapacityUnits: 1
13 TableName: "MQTTAuthTable"

I can then use this table to pull out a list of fields (including Username and Password) that I need for the Authorizer to do its job.

1def get_details_for_client_id(client_id: str, table: Table) -> DynamoModel:
2 return DynamoModel(
3 **table.get_item(
4 Key=dict(Client_ID=client_id),
5 ProjectionExpression="Username, Password, AllowedTopic, allow_read, "
6 "allow_connect, allow_write, read_topic, write_topic",
7 )["Item"],
8 Client_ID=client_id,
9 )

The return of the Lambda Authorizer is a json object that should provide the authentication status (isAuthenticated) and a list of roles that the client is authorized to assume (policyDocuments).

1{
2 "isAuthenticated": true,
3 "password": "PasswordHere",
4 "principalId": "PrincipalHere",
5 "disconnectAfterInSeconds": 3600,
6 "refreshAfterInSeconds": 3600,
7 "policyDocuments": [
8 {
9 "Version": "2012-10-17",
10 "Statement": [
11 {
12 "Action": "iot:Connect",
13 "Effect": "Allow",
14 "Resource": "arn:aws:iot:ap-southeast-2:MY_ID:client/CLIENT_ID"
15 },
16 {
17 "Action": "iot:Receive",
18 "Effect": "Allow",
19 "Resource": "arn:aws:iot:ap-southeast-2:MY_ID:topic/integration/cbb38fe8/read"
20 },
21 {
22 "Action": "iot:Subscribe",
23 "Effect": "Allow",
24 "Resource": "arn:aws:iot:ap-southeast-2:MY_ID:topicfilter/integration/cbb38fe8/read"
25 },
26 {
27 "Action": "iot:Publish",
28 "Effect": "Allow",
29 "Resource": "arn:aws:iot:ap-southeast-2:MY_ID:topic/integration/cbb38fe8/write"
30 }
31 ]
32 }
33 ]
34}

The _topic and allow_ attributes pulled from the DynamoDB table control the generation of the Actions that the client is able to assume (iot:Publish iot:Subscribe iot:Receive iot:Connect) and the Resources that it's able to use those actions on.

The authorization route ends up looking like the AWS provided custom authentication workflow diagram but with the addition of a DynamoDB table for storage of credentials and roles.

authorizer_example

The deployed SAM template for this example ends up being pretty short.

1AWSTemplateFormatVersion: '2010-09-09'
2Transform: AWS::Serverless-2016-10-31
3Description: >
4 AWS IOT Custom Authorizer with Python 3.9+ using AWS SAM
5Globals:
6 Function:
7 Timeout: 3
8
9Resources:
10
11 UnsignedAuthorizerPermission:
12 Type: AWS::Lambda::Permission
13 Properties:
14 Action: lambda:InvokeFunction
15 Principal: iot.amazonaws.com
16 SourceArn: !GetAtt UnsignedAuthorizer.Arn
17 FunctionName: !GetAtt AuthFunction.Arn
18
19 AuthFunction:
20 Type: AWS::Serverless::Function
21 Properties:
22 CodeUri: src/authorizer
23 Handler: authorizer.app.lambda_handler
24 Runtime: python3.9
25 Architectures:
26 - x86_64
27 Environment:
28 Variables:
29 AWS_ACCOUNT_ID: !Sub ${AWS::AccountId}
30 DYNAMO_TABLE_NAME: !Ref Table
31 Policies:
32 - Version: "2012-10-17"
33 Statement:
34 - Effect: Allow
35 Action:
36 - "dynamodb:Get*"
37 - "dynamodb:Query"
38 Resource: !GetAtt Table.Arn
39 Table:
40 Type: AWS::DynamoDB::Table
41 Properties:
42 KeySchema:
43 - AttributeName: "Client_ID"
44 KeyType: "HASH"
45 AttributeDefinitions:
46 - AttributeName: "Client_ID"
47 AttributeType: "S"
48 ProvisionedThroughput:
49 ReadCapacityUnits: 1
50 WriteCapacityUnits: 1
51 TableName: "MQTTAuthTable"
52
53 UnsignedAuthorizer:
54 Type: AWS::IoT::Authorizer
55 Properties:
56 AuthorizerFunctionArn: !GetAtt AuthFunction.Arn
57 AuthorizerName: "MqttAuth-Unsigned"
58 EnableCachingForHttp: true
59 SigningDisabled: True
60 Status: "ACTIVE"
61
62Outputs:
63 UnsignedAuthorizerName:
64 Description: "Name of unsigned authorizer"
65 Value: !Ref UnsignedAuthorizer
66
67 UnsignedAuthorizerStatus:
68 Description: "Unsigned authorizer active. Currently a placeholder value to be used when I create a secure authorizer"
69 Value: true
70
71 TableName:
72 Description: "Table name that stores AWS Authorizer Credentials"
73 Value: !Ref Table

The SAM template can be deployed by installing AWS CLI, AWS SAM and running

1sam build
2sam deploy --guided

There are some tests in tests/integration that help validate that the deployment is successful, these make heavy use of pytest fixtures to keep the tests DRY.

Connecting via the Authorizer

The best example for how to connect are the Integration tests that are provided in test/integration as they include working examples with the test_invoke_authorizer command to validate the authorizer works, as well as examples for Paho MQTT and AWS IOT SDK V2. It's likely that you'lll need to set the STACK_NAME environment variable to the name of your stack so that it can find your resources.

The main things to remember when connecting with a real client with a fair few listed in the guide:

  • You will need to truncate ?x-amz-customauthorizer-name= to your username.
  • You will need to include an 'ALPN' of MQTT.
  • You will need to ensure you trust the AWS IOT V3 CA Certificate.
  • You will need to be using the ATS endpoint, which you can find with the command aws iot describe-endpoint --endpoint-type "iot:Data-ATS".
  • You will need to be connected to port 443 for MQTT authentication with a custom authorizer.

Connecting with Paho (Python)

requirements.txt
1paho-mqtt==1.6.1

Example connection code

1from urllib.request import urlretrieve
2from urllib.parse import quote_plus
3from pathlib import Path
4import ssl
5import paho.mqtt.client as mqtt
6
7# client_id = YOU_NEED_TO_SET
8# username = YOU_NEED_TO_SET
9# password = YOU_NEED_TO_SET
10# aws_endpoint = YOU_NEED_TO_SET
11# authorizer_name = YOU_NEED_TO_SET
12
13# Download CA certificate
14aws_ca = Path(__file__).parent / "awsCA.pem"
15urlretrieve("https://www.amazontrust.com/repository/AmazonRootCA1.pem",aws_ca)
16
17# Create client
18mqtt_client = mqtt.Client(client_id=client_id)
19
20# Setup SSL
21ssl_context = ssl.create_default_context()
22ssl_context.set_alpn_protocols(["mqtt"])
23ssl_context.load_verify_locations(aws_ca)
24
25# Setup Client
26mqtt_client.tls_set_context(context=ssl_context)
27mqtt_client.username_pw_set(
28 username=f"{username}?x-amz-customauthorizer-name={quote_plus(authorizer_name)}"
29 password=password
30)
31# Connect
32mqtt_client.connect(host=aws_endpoint, port=443, keepalive=60)

From here I'd suggest looking at Steves-internet-guide for more information on publishing and subscribing using Paho.

Connecting and Publishing with AWS IOT SDK V2 (Python)

Thankfully this is a LOT easier as AWS provide a direct_with_custom_authorizer function that does most of the heavy lifting for you.

requirements.txt
1awsiotsdk==1.11.3

Example connection code

1from awscrt.mqtt import Connection, QoS
2from awsiot.mqtt_connection_builder import direct_with_custom_authorizer
3
4# client_id = YOU_NEED_TO_SET
5# username = YOU_NEED_TO_SET
6# password = YOU_NEED_TO_SET
7# aws_endpoint = YOU_NEED_TO_SET
8# authorizer_name = YOU_NEED_TO_SET
9
10# Download CA certificate
11aws_ca = Path(__file__).parent / "awsCA.pem"
12urlretrieve("https://www.amazontrust.com/repository/AmazonRootCA1.pem",aws_ca)
13
14aws_iot_connection = direct_with_custom_authorizer(
15 auth_username=username,
16 auth_authorizer_name=authorizer_name,
17 auth_password=password,
18 **dict(
19 endpoint=aws_endpoint,
20 client_id=test_client,
21 ca_filepath=aws_ca.absolute().__str__(),
22 port=443),
23 )
24connect_future = aws_iot_connection.connect()
25connect_future.result(timeout=20)

Once your connection_future returns successfully, it's trivial to start using the examples to see how to subscribe/publish.

Connecting and Publishing with C++ (PubSubClient) - ESP32/ESP8266/Arduino

As with all arduino/esp32/esp8266 things, I highly suggest using platformio with vs code as using a full-featured IDE makes your life a lot easier.

I have a link to a full example in my repo but as a summary.

I like to split up constants like passwords into their own header file.

lib/secrets/secrets.h
1const char* wifi_name = "";
2const char* wifi_pass = "";
3const char* mqtt_username = "";
4const char* mqtt_password = "";
5const char* mqtt_client_id = "";
6const char* mqtt_ats_endpoint = "";
7const char* mqtt_custom_authorizer_name= "";
8const char* mqtt_publish_topic = "";
9
10// the AWS IOT CA certificate isn't a secret
11// It's in here for convenience
12const char CA_CERT[] = R"EOF(-----BEGIN CERTIFICATE-----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31-----END CERTIFICATE-----)EOF";

Your main function would then look something like

src/main.cpp
1#include <Arduino.h>
2#include <secrets.h>
3#ifdef ESP32
4#include <WiFi.h>
5#elif defined(ESP8266)
6#include <ESP8266WiFi.h>
7#endif
8#include <WiFiClientSecure.h>
9#include <PubSubClient.h>
10WiFiClientSecure secure_client = WiFiClientSecure();
11PubSubClient mqttClient = PubSubClient(secure_client);
12const char *aws_protos[] = {"mqtt", NULL};
13
14String mqtt_modified_username(const char * username)
15{
16 // AWS requires x-amz-customauthorizer-name along with username
17 // note the authorizer name needs to be URL encoded if you use special characters.
18 return String(username) + String("?x-amz-customauthorizer-name=")
19 + String(mqtt_custom_authorizer_name);
20}
21void setup_wifi()
22{
23 WiFi.begin(wifi_name, wifi_pass);
24 while (WiFi.status() !=WL_CONNECTED )
25 {
26 Serial.println("Failed to connect to WiFi");
27 Serial.println(WiFi.status());
28 sleep(5);
29 }
30 Serial.println("Connected to WiFi");
31}
32
33void setup_mqtt()
34{
35 secure_client.setCACert(CA_CERT);
36 secure_client.setAlpnProtocols(aws_protos);
37 mqttClient.setSocketTimeout(10);
38 mqttClient.setServer(mqtt_ats_endpoint,443);
39 mqttClient.setKeepAlive(60);
40 while(!mqttClient.connected())
41 {
42
43 mqttClient.connect(mqtt_client_id,mqtt_modified_username(mqtt_username).c_str(),mqtt_password);
44 Serial.println("Failed to connect to MQTT");
45 sleep(5);
46 }
47 Serial.println("Connected to MQTT");
48}
49
50void setup() {
51 Serial.begin(9600);
52 setup_wifi();
53 setup_mqtt();
54}
55
56void loop() {
57 sleep(200);
58 mqttClient.publish(mqtt_publish_topic,testPublishString.c_str());
59}

The highlighted rows are used to maintain compatibility between ESP32 and ESP8266 modules.

Debugging steps

There are some pretty standard steps that you can go through to debug this:

Run the Integration tests

If you're using the provided repository then the integration tests in tests/integration are pretty good validation for whether everything is working as intended.

Check the Authorizer Lambda

Check your Lambda functions Invocations to check that it was called, and confirm whether that invocation provided any errors.

If you're not seeing an invocation then it's likely you've got issues with your connection strings, either because of your endpoint, not specifying an authorizer, not trusting the AWS Certificate, wrong port or possibly you've set your IOT authorizer to Status: "INACTIVE".

Check the Lambda returned message

Check whether the client was Authorized, and if not then check your username/password for the client.

If it was authorized then it's worth checking the returned policy and being mindful that not all MQTT wildcard characters will behave as expected in AWS IOT.

The following table from AWS documentation is very useful to keep in mind.

Wildcard characterIs MQTT wildcard characterExample in MQTTIs AWS IoT Core policy wildcard characterExample in AWS IoT Core policies for MQTT clients
#Yessome/#NoN/A
+Yessome/+/topicNoN/A
*NoN/AYestopicfilter/some/*/topic
?NoN/AYestopic/some/?????/topic topicfilter/some/sensor???/topic

Check the AWS IOT console

The AWS monitor page is going to be very useful to check whether AWS IOT saw your connection. aws monitor

If you're trying to debug whether publishing is working, it's worth using the MQTT test client in the AWS console to subscribe to the topic that you're trying to publish to. Similarly, for testing subscriptions it might be useful to use the MQTT test client to Publish a message on the topic that you're subscribed to.