logoalt Hacker News

taftstertoday at 1:46 AM1 replyview on HN

How do you automate, for example, "HTTPS over websocket with OAuth", without providing some kind of hard-coded, static or otherwise persistent authentication credentials to the calling system in some form (either certificate based auth, OAuth credentials, etc.)?

The problem with IoT and embedded secrets isn't really a solved problem, from what I can tell. I'm not sure that OAuth exactly solves the problem here. Though all your comments about SSH (especially host verification) holds true.

Just honestly trying to understand the possible solution space to the IoT problem and automated (non-human) authorization.


Replies

emmelaichtoday at 2:46 AM

The manufacturer should at least supply certificates, and it could be up to you to ignore or use. It's not much but it's something.