Secure IoT Platform end points

Even though we support a non SSL based deployments for behind the firewall implementations, we ensure that the customer can enable all the IoT platform security mandates when deployed on the cloud. All End points from the Edge Devices to the Hosted IoT Platform to the Mobile Applications are secured in data transfer as well as data access.

Secure Device Communication

  • Connect devices with IoT platform security  Connect devices with the Server Securely via TLS / SSL
  • use self-signed certificates  Use Self Signed Certificates created using OpenSSL – Refer HowTo
  • Certificate authority  certificates provided by any Certificate Authority like LetsEncrypt
Secure Device Communication
MQTT Authentication

MQTT Authentication

  • Common token   Use a common token for a group of devices.
  • Individual Auth key & Token   Assign Individual AuthKey and Token.
  • Control data flow   READ ONLY , WRITE ONLY & READ / WRITE based keys to control data flow.
  • Delete Auth Tokens   Disable / Enable or Delete Auth Tokens as needed.

Custom Authentication

Custom Authentication helps you get the Authentication token form any end point of your convenience. The Platform will send you a HTTP request with Client, authentication tokens received from the edge device to the specified authentication servers. Custom authentication is supported for large deployments for a single customer.

Custom Authentication
Application Security

Application Security

The Web interface, REST API and Mobile SDKs are build over a strong back end framework to be secure against all phishing attacks. You can also add your ssl certificate using any CA like LetsEncrypt and have your customers and other application access your server via a secure layer.