Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Learning AWS IoT
  • Table Of Contents Toc
  • Feedback & Rating feedback
Learning AWS IoT

Learning AWS IoT

By : Kurniawan
2.8 (6)
close
close
Learning AWS IoT

Learning AWS IoT

2.8 (6)
By: Kurniawan

Overview of this book

The Internet of Things market increased a lot in the past few years and IoT development and its adoption have showed an upward trend. Analysis and predictions say that Enterprise IoT platforms are the future of IoT. AWS IoT is currently leading the market with its wide range of device support SDKs and versatile management console. This book initially introduces you to the IoT platforms, and how it makes our IoT development easy. It then covers the complete AWS IoT Suite and how it can be used to develop secure communication between internet-connected things such as sensors, actuators, embedded devices, smart applications, and so on. The book also covers the various modules of AWS: AWS Greengrass, AWS device SDKs, AWS IoT Platform, AWS Button, AWS Management consoles, AWS-related CLI, and API references, all with practical use cases. Near the end, the book supplies security-related best practices to make bi-directional communication more secure. When you've finished this book, you'll be up-and-running with the AWS IoT Suite, and building IoT projects.
Table of Contents (10 chapters)
close
close

Authentication and authorization


You have learned how to set up identity and secure communication for IoT devices. When an IoT device with its identity accesses AWS IoT, this IoT device will be challenged to verify its access rights.

To verify access rights for an IoT device, we can apply for authentication and authorization. Authentication is the process of verifying who you are. Authorization is the process of verifying that you have access to something. 

Because we have applied an identity to our IoT device and registered it to AWS IoT, we are done with authentication. We will know the IoT device's identity, that accesses AWS IoT. When IoT device accesses AWS IoT resources without identity registration to AWS IoT, it will be rejected by AWS IoT.

Authorization in AWS IoT can be done through the AWS IoT policy. We can apply a policy to each IoT device. When you register a new IoT device, this will generate a security certificate and its policy. You can find a list of AWS IoT policies in the...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY