Overview
  • IoThentix
  • Our Solution
    • Identity Provider for IoT
    • Request a Token Today
  • Why Use Tokens
    • Advantages of Tokens
    • Disadvantages of Certificates
  • Fundamentals
    • Register
    • Identify
    • Authenticate
    • Verify
  • Advanced use cases
    • Update Device Credentials
    • Renew Access Token
  • Technical Details
    • Developer Guide
    • API Reference
Powered by GitBook
On this page
  1. Fundamentals

Authenticate

PreviousIdentifyNextVerify

Last updated 2 years ago

Once the IoT device has received the access token from the identity provider the device can start to send its data to the IoT platform. The device establishes a secure connection to the IoT platform, authenticating the IoT platform through a TLS connection. Then the IoT device passes the data along with the access token to the IoT platform. The IoT platform now can authenticate the IoT device based on the provided access token with the identity provider by calling the introspection endpoint.