To bring security to an IoT solution the fundamental concept is to create a unique and trusted identify for each hardware device, commonly called IoT end nodes. In addition, the onboarding process must include an authentication that is trusted for every entity the Cloud communicates with.