psk authentication scheme
Asked by
Dora Esmephi
Hi,
I am working with constrained devices and trying to use the psk scheme for authentication but the documentation on it is rather scarce. I am unsure, for instance, of the use of the psk hint. I also assume the scheme consist in a challenge/response dialog and would like to know more about the specifics of this challenge.
Thank you in advance
Question information
- Language:
- English Edit question
- Status:
- Solved
- For:
- mosquitto Edit question
- Assignee:
- No assignee Edit question
- Solved by:
- Roger Light
- Solved:
- Last query:
- Last reply:
To post a message you must log in.