Secure Application Access

After an NA obtains authentication information and connects to the IoT platform, the NA uses the authentication information to call other APIs.