Главная
Study mode:
on
1
Intro
2
Risks
3
Audit logs
4
Customer requests
5
Rolebased access control
6
Summary
7
Outbound connections
8
Terminal access
9
VPN
10
Reverse SSH
11
Raw Socket
12
Web Socket
13
Offtheshelf solutions
14
MQTT
15
Other Use Cases
16
Off the Shelf Solutions
17
VPN SSH
18
WebSocket
19
WebSocket Terminal
20
Offtheshelf
21
Questions
Description:
Explore common needs and approaches for remote access to IoT devices in this informative conference talk by Eystein Måløy Stenberg from Northern.tech Inc. Delve into crucial topics such as risks, audit logs, customer requests, and role-based access control. Learn about various connection methods including outbound connections, terminal access, VPN, reverse SSH, raw socket, and web socket. Discover off-the-shelf solutions and MQTT implementations. Gain insights into other use cases and compare different remote access approaches. Note that the first 10 minutes of the video lack audio due to technical difficulties.

Remote Access to IoT Devices: Common Needs and Approaches

Linux Foundation
Add to list