Chapter 9. Identity, Authentication, Authorization, and Accounting
Topics covered in this chapter include
■ Introduction to Identity and Access Management for the IoT
■ Dynamic Authorization Privileges
■ Manufacturer Usage Description (MUD)
■ AWS Policy-based Authorization with IAM
■ Scaling IoT Identity and Access Management with Federation Approaches
■ Evolving Concepts: Need for Identity Relationship Management (IRM)
In Chapter 8, “The Advanced IoT Platform and MANO,” we discussed the building blocks and functionality required to bring automation and orchestration capabilities to a platform-type approach. Now we look at the identity and ...
Get Orchestrating and Automating Security for the Internet of Things: Delivering Advanced Security Capabilities from Edge to Cloud for IoT now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.