Comment on page
Once the IoT device has received the access token from the identity provider the device can start to send its data to the IoT platform. The device establishes a secure connection to the IoT platform, authenticating the IoT platform through a TLS connection. Then the IoT device passes the data along with the access token to the IoT platform. The IoT platform now can authenticate the IoT device based on the provided access token with the identity provider by calling the introspection endpoint.