
Identity At The Center #33 - IAM for IoT
Identity at the Center
00:00
Machine-to-Machine Authentication and Token Use
Jim explains machine-to-machine auth, avoiding hard-coded credentials, and adopting token-based approaches like OAuth2.
Play episode from 14:23
Transcript


