What's New

Updated on 2024/12/24 GMT+08:00

The tables below describe the functions released in each IoT Device Access version and corresponding documentation updates. New features will be successively launched in each region.

September 2024

No.

Feature

Description

Phase

Document

1

Online debugging upgrade

1. Online debugging supports the search function for message tracing.

2. Online debugging supports message reporting and delivery.

Commercial use

/

2

AMQP Android SDK access

An example for Android SDK access is provided to describe how to forward data to an AMQP queue.

Commercial use

Android SDK Access Example

August 2024

No.

Feature

Description

Phase

Document

1

Console upgrade

An intuitive, integrated, reliable, and responsive console is available. You can easily manage instances and devices, monitor exceptions, and implement efficient O&M.

Commercial use

/

2

Experience optimization

1. The instance description supported more character types.

2. The basic edition can be unsubscribed.

3. Up to 5,000 devices can be deleted in batches from the device list.

4. MQTT connection parameters can be obtained from the device list.

5. The creation time is added to the product list.

Commercial use

/

3

Abnormal data forwarding channel

The platform rule engine forwards data to an abnormal channel if the data fails to be forwarded to other Huawei Cloud services or third-party applications.

Commercial use

Abnormal Data Target

July 2024

No.

Feature

Description

Phase

Document

1

Custom device domain name

With a custom domain name, you can manage your own server certificates, including the root certificate authority (CA), signature algorithms, and certificate lifecycles.

Commercial use

Custom Device Domain Name

2

Experience optimization

1. The script-based development supported auto saving.

2. The console supported batch operations.

3. The device version number can be displayed when a device is selected for software/firmware upgrade.

4. The display of operation result feedback is optimized.

5. The Chinese display of message tracing is optimized.

6. The message tracing export file is optimized.

Commercial use

/

June 2024

No.

Feature

Description

Phase

Document

1

Device certificates

For a device using MQTTS X.509 certificates, when it connects to the platform for the first time, IoTDA utilizes the uploaded and verified device CA certificate to authenticate the device certificate. After the authentication is successful, the platform automatically saves the device certificate. You can check and disable device certificates, and receive expiration warnings.

Commercial use

Device Certificates

2

Custom functions for device authentication

Before connecting a device to the platform, you can use the application to configure custom authentication information on the console, and then configure custom authentication functions by using FunctionGraph. When the device connects to IoT platform, the platform obtains parameters such as the device ID and custom authentication function name, and sends an authentication request to FunctionGraph. The user implements the authentication logic to complete access authentication.

Commercial use

MQTT(S) Custom Authentication

3

Experience optimization

1. Enterprise projects can be searched.

2. Virtual device names can be customized.

3. The online debugging page is optimized.

Commercial use

/

May 2024

No.

Feature

Description

Phase

Document

1

M2M communications

You can create a rule to forward messages reported by devices to other devices, enabling message communications between devices.

Commercial use

M2M Communications

2

Experience optimization

1. The specification calculation capability is added for the standard edition.

2. Enterprise projects can be selected for run logs.

3. The function of saving device information is optimized.

Commercial use

/

3

Custom templates for device authentication

You can use a custom authentication template to orchestrate internal functions provided by the platform and flexibly customize triplet parameters ClientId, Username, and Password for MQTT device authentication.

Commercial use

MQTT(S) Custom Template Authentication

4

Python\Node.js\Go\C# language demos for MQTT subscription push

The Python\Node.js\Go\C# language demos are added for MQTT subscription push to receive messages subscribed by the server.

Commercial use

Python Demo

GO Demo

Node.js Demo

C# Demo

April 2024

No.

Feature

Description

Phase

Document

1

Custom topic communications

You can customize topics for publishing and subscription. Usage and scenarios of topics starting with $oc and not starting with $oc are described.

Commercial use

Custom topic communications

March 2024

No.

Feature

Description

Phase

Document

1

Automatic device registration

You can set a self-registration template, with which the device can connect to the platform without registering on the platform in advance. The platform parses the template content based on the device connection information and automatically registers the settings.

Commercial use

Device Self-Registration

February 2024

No.

Feature

Description

Phase

Document

1

Stacked forwarding data clearance

When the rule engine forwards messages to a third-party application, if the application cannot process the data in real time, the data will be stacked on the platform. You can clear the data stacked in the forwarding channel for timely processing.

Commercial use

Data Forwarding Channel Details

January 2024

No.

Feature

Description

Phase

Document

1

SMN notification templates for linkage rules

When setting a device linkage rule and selecting notification sending as the rule action, you can use the template defined by Simple Message Notification (SMN).

Commercial use

Cloud Rules

December 2023

No.

Feature

Description

Phase

Document

1

Authentication credential switchover

You need to update a device access credential in some scenarios, for example, when an X.509 certificate is about to expire. IoTDA provides master/sub fingerprints and secrets to prevent device authentication failure and service interruption during credential update and resetting. For example, when you add a new certificate fingerprint, the platform sets the fingerprint as a backup (sub fingerprint). In this way, the corresponding device can use both the old certificate (if not updated on the device side timely) and the new certificate to connect to the platform smoothly.

Commercial use

Authentication Credentials

November 2023

No.

Feature

Description

Phase

Document

1

M2M communications

IoTDA supports MQTT-based M2M communications among devices.

Commercial use

M2M Communications

April 2023

No.

Feature

Description

Phase

Document

1

Message Broadcasting

This API is used by an application to broadcast a message to all online devices that subscribe to a specified topic.

Commercial use

Broadcasting a Message

March 2023

No.

Feature

Description

Phase

Document

1

Remote Device Configuration

The platform allows you to perform remote configuration. You can remotely update device configuration items such as system and running parameters without interrupting device running.

Commercial use

Remote Device Configuration

February 2023

No.

Feature

Description

Phase

Document

1

Restrictions on device shadow specifications

Added limitations on device shadow specifications to the Message communications category.

Commercial use

Limitations

January 2023

No.

Feature

Description

Phase

Document

1

Monitoring and O&M

IoTDA allows you to remotely log in to devices from the console over the Secure Shell Protocol (SSH). You can enter commands supported by devices to debug functions and locate faults. This facilitates device management and remote O&M.

Commercial use

Remote Login

December 2022

No.

Feature

Description

Phase

Document

1

AMQP subscription/push

You can use a Go SDK to connect to IoTDA and receive subscribed messages from the platform based on AMQP.

Commercial use

Go SDK Access Example

2

AMQP subscription/push

You can use a Python 3 SDK to connect to IoTDA and receive subscribed messages from the platform based on AMQP.

Commercial use

Python SDK Access Example

3

Device-side rules

Cloud rules are parsed and executed on the cloud. IoTDA determines whether triggering conditions are met and triggers corresponding device linkage actions. Device-side rules are device linkage rules delivered to devices, where the device-side rule engine parses and executes the rules. Device-side rules can still run on devices when the network is interrupted or devices cannot communicate with the platform.

Commercial use

Device-side rules

November 2022

No.

Feature

Description

Phase

Document

1

Rules

You can create flow control policies in different dimensions on IoTDA based on your service scenarios and performance of the forwarding target (such as a third-party application server) to control data forwarding flows.

Commercial use

Data Forwarding Stack Policies

2

Rules

If the forwarding target (such as a third-party application server) cannot process data forwarded by IoTDA in a timely manner due to insufficient performance, unprocessed data will be stacked (cached) on IoTDA. By default, the maximum stack (cache) size of data to forward for a single forwarding rule is 1 GB, and the maximum stack duration is 24 hours. If the maximum stack size or stack duration is exceeded, the earliest unprocessed data will be discarded to meet the stack size and duration requirements.

Commercial use

Data Forwarding Flow Control Policies