Industrial Internet

IAM and Industrial Internet – Cryptographic identities for devices

Cryptography, and asymmetric aka public key cryptography in particular still radiates an aura of mystery and confusion. Public key cryptography is far from bleeding-edge though, as it was discovered in 1970 by James Ellis, a British cryptographer working for the … Read More

IAM and Industrial Internet – Strong device identities

When it comes to IoT, it is paramount to distinguish between authentication and authorisation. Typically, there are long discussions centred around device identities – authentication – while managing their access rights waved by one sentence such as “the portal will … Read More

IAM and IoT

IAM and IoT – Part One

World of Industrial Internet Imagine that starting from tomorrow, you simply wouldn’t have any Internet access for the next week. Now extend the week to the rest of the year. That is the everyday experience of most of the industry … Read More