JP Industries Limited is Indian home appliances company based in Hyderabad, Telangana, India.
It manufactures and markets various Home Appliances and Non-stick cookware's under the brand name of JP.
It is also manufactures of consumer durable products, laptops, desktops, mobile handsets and other devices.
Off late JP had undergone throughlot of thefts of their assets and JP is looking at building asset tracking through AWS IOT thereby allowing enterprise to easily locate and monitor key assets, including along the supply chain (e.g.
raw materials, final products and containers) to optimize logistics, maintain inventory levels, prevent quality issues and detect theft. IT teams are working on authentication of mobile applications, web and desktop applications and IOT devices.
Suggest appropriate authentication mechanisms for each of the devices listed above.
Select 3 options.
Click on the arrows to vote for the correct answer
A. B. C. D. E. F.Answer : A, C, E.
Option A is correct -AWS IoT devices use X.509 certificates.
https://docs.aws.amazon.com/iot/latest/developerguide/iot-authentication.htmlOption B is incorrect -AWS IOT devices cannot use Cognito Federated Identities for authentication.
https://docs.aws.amazon.com/iot/latest/developerguide/iot-authentication.htmlOption C is correct -Mobile Applications use Amazon Cognito Identities for authentication.
https://docs.aws.amazon.com/cognito/latest/developerguide/authentication.htmlOption D is incorrect -Mobile Applications cannot use Federated identities for authentication.
https://docs.aws.amazon.com/cognito/latest/developerguide/authentication.htmlOption E is correct -Web and desktop applications use IAM or federated entities for authentication.
https://docs.aws.amazon.com/cognito/latest/developerguide/authentication.htmlOption F is incorrect -Web and desktop applications cannot use x.509 certificates for authentication.
https://docs.aws.amazon.com/cognito/latest/developerguide/authentication.htmlAsset tracking through AWS IoT requires authentication mechanisms to ensure the security of the data and devices. The devices listed in the question are mobile applications, web and desktop applications, and IoT devices.
Here are the appropriate authentication mechanisms for each of the devices listed in the question:
AWS IoT devices use X.509 certificates for authentication. X.509 certificates are a standard format for digital certificates that are used to verify the identity of devices. These certificates are issued by a trusted Certificate Authority (CA) and are used to establish a secure connection between devices and the cloud. This mechanism ensures that only authorized devices can connect to the AWS IoT platform.
Mobile applications use Amazon Cognito Identities for authentication. Amazon Cognito is a managed service that provides user authentication, authorization, and user data synchronization for mobile and web applications. With Amazon Cognito, you can easily add user sign-up, sign-in, and access control to your mobile and web applications.
Mobile applications can also use Federated identities for authentication. Federated identities enable users to sign in to a mobile application using their existing social identity providers, such as Facebook, Google, or Amazon. With Federated identities, users can use their existing accounts to sign in to your application without creating a new account.
Web and desktop applications can use IAM or Federated identities for authentication. IAM (Identity and Access Management) is a web service that helps you securely control access to AWS resources. IAM allows you to create and manage AWS users and groups, and assign permissions to these entities to access AWS resources.
Web and desktop applications can also use X.509 certificates for authentication. X.509 certificates are a standard format for digital certificates that are used to verify the identity of devices and users. These certificates are issued by a trusted Certificate Authority (CA) and are used to establish a secure connection between devices and the cloud. This mechanism ensures that only authorized devices and users can connect to the AWS platform.
In summary, appropriate authentication mechanisms for the devices listed in the question are: