To connect your devices to the Losant Platform, you must use a set of security credentials called access keys. Access keys consist of a generated key and secret pair. An access key can be used to authenticate multiple devices in an application or multiple access keys can be created to scope your devices into virtual security groups.
You can view the the access keys for an application by choosing
Access Keys in the Application menu bar.
Access keys can be added to your application by using the
Add Access Key button on the
Access Keys page.
You can choose to either make this access key valid for use by any device in this application, or restrict it to work for only a subset of devices. A restricted key will only be usable for authentication by the devices you define, and any device authenticated using a restricted key will only be able to see other devices that are in that same restricted scope. Restrictions can be specified as a comma-separated list of device IDs and tags. Tags are specified using “key=value” pairs. For more information device IDs and tags read about Device Queries.
Create Access Key, the newly generated key and secret will be displayed. You will either need to copy your key and secret to a secure location or download them to a file on your computer.
IMPORTANT: Losant does not store key secrets and they cannot be recovered or regenerated if lost. If you fail to save your key secret before closing the window, you will have to generate a new access key / secret pair.
After you’ve saved your access key and secret, check the
I have copied my access key and secret to a safe place box and click
To temporarily deactivate an access key …
- Click the switch alongside the access key in the list view, OR
- From the access key’s detail page, toggle the switch in the far right of the column.
If an access key is no longer needed, or you believe it has been compromised, you may permanently delete it by:
- Clicking on the
Deleteicon in the access key list, OR
- Clicking the
Delete Access Keybutton on the access key’s detail page
To find out more on using access keys with our MQTT clients, checkout the various Losant MQTT client libraries. To learn more about using access keys with our REST API, checkout the various Losant REST client libraries.