Identity and Access Management Solutions for the IoT

While society continues to adopt ever more smart home appliances and IoT wearables, the IoT is diversifying into broader applications for different professions, and governments and throughout industries. The network connectivity needed to support it is becoming ubiquitous and, to that end, devices will need to be identified and access provisioned in new and different environments and organizations. This chapter provides an introduction to identity and access management for IoT devices. The identity life cycle is reviewed, and a discussion on infrastructure components required for provisioning authentication credentials is provided, with a heavy focus on PKI. We will also examine different ...

Get Practical Internet of Things Security - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.