How It Works

Deep dive into the Secure IoT Provisioning Module

Understand what's included in the solution and how the two-step security model ensures robust IoT device onboarding.

A Closer Look at the Security Model

Visualizing the two-step device provisioning process.

Step 1: Onboarding

The device uses a generic onboarding certificate for an initial, secure connection to the provisioning service.

Step 2: Unique Credentials

The service validates the device and generates unique, long-term credentials for direct communication with AWS IoT Core.

Operational

The device securely connects to AWS IoT Core with its new proof of identity, ready for operation.

Everything You Need to Get Started

A comprehensive toolkit for secure IoT provisioning.

AWS CDK Application

A Python-based AWS Cloud Development Kit (CDK) app to deploy necessary AWS infrastructure.

Two-Step Security Model

Onboarding certificates for initial connection, followed by unique, on-demand device credentials for enhanced security.

REST API

Manage certificates, IoT Things, and device registration status using well-documented REST API.

Sample Python Script

A working example of device firmware logic and AWS IoT Core connectivity to guide your developers.

Comprehensive Documentation

Solution architecture diagrams, a list of AWS services, and customization guides to help you adjust the Secure IoT Provisioning Module to your unique needs.

Expert Deployment Support

Hands-on assistance to deploy and configure the solution in your environment, ensuring optimal setup and avoiding common pitfalls.

Ready to Get Started?

Now that you understand how it works, share your IoT requirements and help us build the perfect solution for your needs.