![]() ![]() When the connection drops, instead of saving CATs to a local device and establishing a token re-delivery method. With the updated security improvement, you can now revoke client access tokens (CAT) after a successful connection. Previously, when a secure tunnel was established, a token could have been stored and reused, making it susceptible to malicious use. ![]() The third improvement is the introduction of single-use token. For example, you can now remotely access a web application that is running on a device to gain real-time telemetry or perform administrative tasks in a web-based Graphic User Interface(GUI). With multiple simultaneous Transmission Control protocol(TCP) connections, you can establish tunnels to access HTTP-based applications that typically make several connections. Secondly, AWS has made it even easier to communicate to remote devices using Secure shell Protocol(SSH), Virtual Network connectivity (VNC) or Remote desktop protocol(RDP), enabling support for multiple simultaneous TCP connections. With improved cost efficiencies, customers can now scale secure tunneling to access a fleet of devices deployed behind restricted firewalls for troubleshooting, configuration updates, training, and other operational tasks to meet the need of their growing IoT workloads on AWS. First, the price of AWS IoT Device Management secure tunneling feature has been reduced by 80% while retaining the maximum tunnel duration at 12 hours. To help elevate customers even further, AWS has made some significant updates to the offering. This is where, secure tunneling, a feature of AWS IoT Device Management has been helping customers to do remote tasks. When devices are deployed behind restricted firewalls at remote sites, you need a way to gain access to those devices for troubleshooting, configuration updates, and other operational tasks.
0 Comments
Leave a Reply. |