

Cognito identities can be authorized to access AWS IoT Core, and their access can be restricted only to the resources relevant to them. For companion apps, use Amazon Cognito, which integrates with several identity providers. Typically the companion apps would authenticate using end-user identities which are managed either by your own identity store or a third party identity provider such as Facebook and Login with Amazon.

Applications also have the option to use pub/sub to communicate directly with the connected devices. An example of a server application would be a fleet management website that plots thousands of trucks on a map in real-time.ĪWS IoT Core enables both companion apps and server applications to access connected devices via uniform, RESTful APIs. Server applications are designed to monitor and control a large number of connected devices at once. A mobile app that lets a consumer remotely unlock a smart lock in the consumer’s house is an example of a companion app. Companion apps are mobile or client-side browser applications that interact with connected devices via the cloud. How should applications access AWS IoT Core?Īpplications connecting to AWS IoT Core largely fall in two categories: 1. AWS IoT Core also offers fine-grained authorization to isolate and secure communication among authenticated clients. The service requires all of its clients (connected devices, server applications, mobile applications, or human users) to use strong authentication (X.509 certificates, AWS IAM credentials, or 3rd party authentication via AWS Cognito). The Device Shadow also accelerates application development by providing an always available interface to devices even when the connected devices are constrained by intermittent connectivity, limited bandwidth, limited computing ability or limited power.Ĭommunication with AWS IoT Core is secure. The Device Shadow accelerates application development by providing a uniform interface to devices, even when they use one of the several IoT communication and security protocols with which the applications may not be compatible. The Device Shadow in AWS IoT Core enables cloud and mobile applications to query data sent from devices and send commands to devices, using a simple REST API, while letting AWS IoT Core handle the underlying communication with the devices.

There is also a Registry where you can register and keep track of devices connected to AWS IoT Core, or devices that may connect in the future. You also configure rules to route the data to other AWS services such as DynamoDB, Kinesis, Lambda, SNS, SQS, CloudWatch, Elasticsearch Service with built-in Kibana integration, as well as to non-AWS services, via Lambda for further processing, storage, or analytics. You can configure rules to filter and transform the data. Included in AWS IoT Core is a Device Gateway that allows secure, low-latency, low-overhead, bi-directional communication between connected devices and your cloud and mobile applications.ĪWS IoT Core also contains a Rules Engine which enables continuous processing of data sent by connected devices.

Connected devices, such as sensors, actuators, embedded devices, smart appliances, and wearable devices, connect to AWS IoT Core over HTTPS, WebSockets, or secure MQTT or LoRaWAN.
