March 2019
Beginner to intermediate
778 pages
34h 20m
English
Before a device can communicate with Cloud IoT Core, it must be authenticated. Cloud IoT Core offers per-device authentication, with up to three credentials for each registered device. Devices may authenticate using public-private key pairs via JSON Web Tokens (JWTs) or RSA tokens. Per-device authentication credentials are strongly preferred, as they allow credentials to be revoked or rotated for a compromised device without affecting other devices.
In order to secure the device provisioning process, Google Cloud Platform offers two IAM roles that may be used by device provisioners: Cloud IoT Provisioner and Cloud IoT Device Controller. The Cloud IoT Provisioner role grants permissions to create and modify ...
Read now
Unlock full access