You have learned how to set up identity and secure communication for IoT devices. When an IoT device with its identity accesses AWS IoT, this IoT device will be challenged to verify its access rights.
To verify access rights for an IoT device, we can apply for authentication and authorization. Authentication is the process of verifying who you are. Authorization is the process of verifying that you have access to something.
Because we have applied an identity to our IoT device and registered it to AWS IoT, we are done with authentication. We will know the IoT device's identity, that accesses AWS IoT. When IoT device accesses AWS IoT resources without identity registration to AWS IoT, it will be rejected by AWS IoT.
Authorization in AWS IoT can be done through the AWS IoT policy. We can apply a policy to each IoT device. When you register a new IoT device, this will generate a security certificate and its policy. You can find a list of AWS IoT policies in the...