Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Amazon Web Services

Deep Dive into AWS IoT Authentication and Authorization

Amazon Web Services and Amazon via AWS Skill Builder

This course may be unavailable.

Overview

Course description

Security is a central concern for all of Amazon Web Services (AWS). Security is extremely important in the field of IoT (Internet of Things) because IoT devices are physically accessible. Authentication and authorization are the foundations of a secure IoT infrastructure.This course explores the concepts of IoT authentication and authorization within AWS IoT. You will learn about the IoT control plane and data plane and how to authenticate and authorize to both. This course is intended for students who would like to securely connect devices, mobile apps, desktop apps, web apps, or the CLI to AWS IoT. You will learn about using different authentication methods and their appropriate authorization policies.

This is an interactive course that includes hands-on exercises using AWS. This course is designed so that you can take the full course from start to finish or select individual topics that suit your interests.

Course objectives

In this course, you will learn:

  • What authentication and authorization are
  • The difference between the control plane and data plane in AWS IoT
  • Different methods of connecting to AWS IoT Core
  • How to use policies to grant proper permissions
  • How to use the different authentication methods
    • X.509 certificates
    • Custom authorizers
    • AWS Identity and Access Management (IAM), federated identities, and Amazon Cognito Federated Identities

Intended audience

This course is intended for:

  • Fleet managers
  • Security architects
  • Device engineers
  • Line-of-business application developers

Prerequisites

We recommend that attendees of this course have the following prerequisites:

  • IoT Foundation: Telemetry
  • AWS IoT Security Primer

Course outline

Module 1: Introduction

  • Welcome
  • Demos in this course
  • Introduction to authentication and authorization
  • Introduction to policies
  • Determining permissions
  • Writing a policy
  • Least privilege
  • Closing

Module 2: Control Plane and Data Plane

  • Control plane vs. data plane
  • Control plane
    • Authenticating
    • Authorizing
    • Common IAM policies for IoT
  • Data plane
    • Authenticating
    • Authorizing: Choosing the appropriate policy type
    • Authorizing: IoT policy action/resource/variable
    • Authentication and authorization requirements
  • Demo
  • Closing

Module 3: X.509 Certificates

  • Introduction
  • Authenticating
    • Authenticating
    • Mutual authentication
    • Creating and registering certificates
  • Authorizing
    • Policy variables with certificate attributes
    • Direct calls to AWS services
  • Deactivating and revoking certificates
  • Demo
  • Closing

Module 4: Custom Authorizers

  • Introduction
  • Authenticating and authorizing
  • Components of a custom authorizer
  • Demo
  • Closing

Module 5: IAM, Federated Identities, and Cognito Identities

  • Authenticating with AWS Identity and Access Management
  • Federated identities
  • IAM federated identities
    • Introduction
    • Authenticating and authorizing
  • Recommended: Amazon Cognito identities
    • Introduction
    • Authenticating
    • Authorizing: Choosing the appropriate policy type
    • Authenticating and authorizing
  • Demo
  • Closing

Reviews

Start your review of Deep Dive into AWS IoT Authentication and Authorization

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.