Edge Computing device onboarding — Part I— Introducing the challenge

Luis Javier Arizmendi Alonso
5 min readAug 8, 2022

This article outlines the challenges that you will face while performing a secure device onboarding at the scale needed in Edge Computing environments and will also introduce FIDO device onboarding (FDO) which will be covered in the following article of the series.

Image by Jon Tyson (unsplash.com)

The “edge device onboarding” problem

Device onboarding refers to the act of including a new device into your established IT/OT architecture, including the specific device configuration needed to be trusted and integrated with the rest of the running systems….in plain words, deploying new systems in a way that you can start using them.

I also mentioned “Edge Computing” in the title. When someone mentions the words “Edge Computing” while describing solution architecture, you should start considering multiple, if not all, of these technical constraints:

  • It will be capable of working in small HW footprint environments
  • It will work at big scale
  • It will tolerate network disruption (or being disconnected)
  • It will be fully automated with a central point of management and observability
  • I will secure data at rest and in transit (even against physical threats)

--

--

Luis Javier Arizmendi Alonso
Luis Javier Arizmendi Alonso

Written by Luis Javier Arizmendi Alonso

I was born some time ago, I’m living daily and, probably, I will eventually die