IoT IAM infrastructure
Now that we have addressed many of the enablers of identity and access management, it is important to elaborate how solutions are realized in infrastructure. This section is primarily devoted to Public Key Infrastructures (PKI) and their utility in securing IAM deployments for the IoT.
802.1x
The 802.1x authentication mechanisms can be employed to limit IP-based IoT device access to a network. Note though that not all IoT devices rely on the provisioning of an IP address. While it cannot accommodate all IoT device types, implementing 802.1x is a component of a good access control strategy able to address many use cases.
Enabling 802.1x authentication requires an access device and an authentication server. The access device is typically an access point and the authentication server can take the form of a RADIUS or some Authentication, Authorization, and Accounting (AAA) server.
Â
PKI for the IoT
Chapter 6, Cryptographic Fundamentals for IoT Security Engineering, provided...