Monthly Archives: May 2019

Pairing and Access Control: Part 2 – Client Implementation

This is the second blog post of the two posts about access control in Nabto. The first post introduced access control and described how to use the uNabto framework and the access control list (ACL) module to enforce access control and pair users. Recall, the overall flow is as follows: user creates an RSA keypair […]

Pairing and Access Control: Part 1 – Intro and Device

This blog post is the first of two that describe all the steps necessary to implement a paired public key authentication (PPKA) based Nabto solution. This first part introduces concepts, explains how access control works in Nabto and dives into the details of implementing the uNabto device side of access control. Device in this context […]