Skip to content

Latest commit

 

History

History

docs

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

UDMI / Docs

UDMI specification and tools

Contents

About UDMI

The Universal Device Management Interface (UDMI) provides a high-level specification for the management and operation of physical IoT systems. This data is typically exchanged with a cloud entity that can maintain a "digital twin" or "shadow device" in the cloud. Please join the [email protected] mailing list for questions and discussion.

By design, this schema is intended to be:

  • Universal Apply to all subsystems in a building, not a singular vertical solution.
  • Device: Operations on an IoT device, a managed entity in physical space.
  • Management: Focus on device management, rather than command & control.
  • Interface: Define an interface specification, rather than a client-library or RPC mechanism.

The following documents give a high level overview of UDMI:

Use Cases

The essence behind UDMI is an automated mechanism for IoT system management. Many current systems require direct-to-device access, such as through a web browser or telnet/ssh session. These techniques do not scale to robust managed ecosystems since they rely too heavily on manual operation (aren't automated), and increase the security exposure of the system (since they need to expose these management ports).

UDMI is intended to support a few primary use-cases:

  • Telemetry Ingestion: Ingest device data points in a standardized format.
  • Gateway Proxy: Proxy data/connection for non-UDMI devices, allowing adaptation to legacy systems.
  • On-Prem Actuation: Ability to effect on-prem device behavior.
  • Device Testability: e.g. Trigger a fake alarm to test reporting mechanisms.
  • Commissioning Tools: Streamline complete system setup and install.
  • Operational Diagnostics: Make it easy for system operators to diagnose basic faults.
  • Status and Logging: Report system operational metrics to hosting infrastructure.
  • Key Rotation: Manage encryption keys and certificates in accordance with best practice.
  • Credential Exchange: Bootstrap higher-layer authentication to restricted resources.
  • Firmware Updates: Initiate, monitor, and track firmware updates across an entire fleet of devices.
  • On-Prem Discovery: Enumerate any on-prem devices to aid setup or anomaly detection.