Overview
  • IoThentix
  • Our Solution
    • Identity Provider for IoT
    • Request a Token Today
  • Why Use Tokens
    • Advantages of Tokens
    • Disadvantages of Certificates
  • Fundamentals
    • Register
    • Identify
    • Authenticate
    • Verify
  • Advanced use cases
    • Update Device Credentials
    • Renew Access Token
  • Technical Details
    • Developer Guide
    • API Reference
Powered by GitBook
On this page
  1. Fundamentals

Verify

PreviousAuthenticateNextUpdate Device Credentials

Last updated 2 years ago

To verify the access token, the IoT platform has to call the introspection endpoint of the identity provider (IdP) and pass along the provided access token of the IoT device.

The IdP then validates the access token for its claims such as its scope, expiration time, and issuer. Upon successful validation, the IdP confirms the authenticity of the token to the IoT platform.

Depending on the use case we offer to customize the response from the IdP to add additional detail to the response of the introspection endpoint, e.g. also including the device ID or other claims from the access token.