How whitelist works
Get the RoTPublicUID module identifier
Each module has a unique and immutable identifier protected by the Root of Trust.
To know the RoTPublicUID of a device you can use the following AT command
You can retrieve the RoTPublicUID of each device during production line and add it it to your whitelist immediately using the API or off-line using UI or API as clarified in the following section.
Using Thingstream portal
To add one or more devices to the whitelist, signup to your Thingstream account and select the Security Services section from the left side menu. From the sub-menu you can enter in the whitelist section and add devices by using the Manage button. You can add single devices or upload a csv file.
In this section
Add devices using an array of RoTs
If you need to add few devices to the whitelist or automat the process you can use the API providing in input a list of RoTPublicUIDs as in the exmple
Add a device using a csv file
Get list of blacklisted devices
Any device that bootstrap in your account and it has not been added to the whitelist, will be blacklisted and no action is possible for this device until it is activated through the UI.
To get the list of devices in the balcklist use the following API
To activate a blacklisted device, you need to access to your account in the Thingstream portal and activate the device as explained in the following section
Activate a blacklisted device
To see the devices in the blacklist, login to your Thingstream account and select the Security Services section from the left side menu. From the sub-menu you can enter in the Blacklist section and see the list of blocked devices. To activate a thing
select the blacklisted device and click on 'View device'
click the Activate button in the Details tab
Once the thing has been activated the corresponding RoTPublicUID is added to the whitelist and the platform triggers the automatic provisioning in the device of the features defined in the device profile (that has been sealed in the device) at the moment of the activation.
Provisioning will happen at the next security heartbeat.