How to use IoT authentication and authorization for security

How to use IoT authentication and authorization for security