The XoT solution delivers the highest possible security to connected devices in the network, making sure that only users with the right credentials can access each protected device. What the right credentials are is up to the customer to decide, both short and long-term so that they can achieve the desired security level, taking into account end-user experience and maturity for security initiatives.
End-user identification can be made in many different ways and below is a simplified division into 5 different categories where 1 is the least secure and 5 the most. It is clearly recommended to aim for level 3 or higher to avoid man-in-the-middle attacks and to utilise the potential in a true PKI infrastructure and ecosystem. Level 1 and 2 can be used for an easy deployment to get started and later improve the security by introducing two-factor authentication when suitable.