{"id":1199,"date":"2024-02-19T13:24:00","date_gmt":"2024-02-19T12:24:00","guid":{"rendered":"https:\/\/macchina.io\/blog\/?p=1199"},"modified":"2026-03-23T08:23:16","modified_gmt":"2026-03-23T07:23:16","slug":"secure-remote-access-for-smart-infrastructure","status":"publish","type":"post","link":"https:\/\/macchina.io\/blog\/internet-of-things\/secure-remote-access-for-smart-infrastructure\/","title":{"rendered":"Secure Remote Access for Smart Infrastructure: A Case Study for Telephony Systems (Part 1)"},"content":{"rendered":"<p><i class=\"fa-regular fa-file-pdf\"><\/i> <a href=\"\/images\/CaseStudy_Telephony.pdf\">Download a PDF version<\/a> of this case study.<\/p>\n<p>Secure remote access to PBX systems (telephony) is like a tricky puzzle. You need to protect your data, your devices, your network and allow all users remote and secure access.<br \/>Recognizing this, AGFEO wanted to provide their service partners, end users and internal support staff with a secure way to access their telephony systems.<\/p>\n<h2 class=\"wp-block-heading\"><strong>IoT in the real world: Agfeo &#8211; Telephony Systems<\/strong><\/h2>\n<p>In this series of posts, we will take you on a journey through <strong>IoT in the real world<\/strong> and how we have built a secure, simple, customizable and scalable remote access solution for all AGFEO TELEPHONE AND COMMUNICATION SYSTEM users.<\/p>\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/macchina.io\/blog\/wp-content\/uploads\/2024\/02\/SecureRemoteAccessforSmartInfrastructure-scaled.webp\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"590\" src=\"https:\/\/macchina.io\/blog\/wp-content\/uploads\/2024\/02\/SecureRemoteAccessforSmartInfrastructure-1024x590.webp\" alt=\"Secure Remote Access for Smart Infrastructure - Infographic Shows IOT Remote Access to PBX Systems\" class=\"wp-image-1201\" srcset=\"https:\/\/macchina.io\/blog\/wp-content\/uploads\/2024\/02\/SecureRemoteAccessforSmartInfrastructure-scaled.webp 1024w, https:\/\/macchina.io\/blog\/wp-content\/uploads\/2024\/02\/SecureRemoteAccessforSmartInfrastructure-300x173.webp 300w, https:\/\/macchina.io\/blog\/wp-content\/uploads\/2024\/02\/SecureRemoteAccessforSmartInfrastructure-768x442.webp 768w, https:\/\/macchina.io\/blog\/wp-content\/uploads\/2024\/02\/SecureRemoteAccessforSmartInfrastructure-1536x885.webp 1536w, https:\/\/macchina.io\/blog\/wp-content\/uploads\/2024\/02\/SecureRemoteAccessforSmartInfrastructure-2048x1180.webp 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Remote Access to PBX Systems &#8211; Fine grained access control for data security and privacy&nbsp;<\/figcaption><\/figure>\n<h2 class=\"wp-block-heading\">AGFEO SUPPORT PORTAL<\/h2>\n<p>GOAL: To provide a seamless and secure authentication and authorization system for all users and devices by integrating macchina.io REMOTE with the AGFEO support portal:<\/p>\n<ul class=\"wp-block-list\">\n<li>to validate logins (password)&nbsp;<\/li>\n<li>access rights and&nbsp;<\/li>\n<li>manage user accounts.&nbsp;<\/li>\n<\/ul>\n<p>Macchina.io REMOTE allows AGFEO Support to access end-user devices in a secure and convenient way, with the end-user&#8217;s consent.<\/p>\n<h2 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color has-link-color wp-elements-0c6a78fbe6f765b1686dec1c1752c1ea\">SECURE REMOTE ACCESS with different user permissions&nbsp;<\/h2>\n<p class=\"has-vivid-cyan-blue-color has-text-color has-link-color has-medium-font-size wp-elements-40010d8702c69037cb011c42e2001e94\"><strong>The benefits of fine grained access control for data security and privacy with macchina.io REMOTE:<\/strong><\/p>\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color has-link-color has-x-large-font-size wp-elements-a420b002fa92c5c0a51cc76a7c1645ef\">What did we do?<\/h2>\n<ul class=\"wp-block-list\">\n<li>We connected the macchina.io REMOTE server to AGFEO\u2019s LDAP database, which contains all account data for service partners (retailers).<\/li>\n<li>We allowed service partners to add their own user accounts in macchina.io REMOTE (but not in LDAP) in order to manage their own IoT devices and customers.<\/li>\n<li>We used macchina.io REMOTE&#8217;s <strong>fine grained access control <\/strong>&#8211; flexible authentication and authorization system to validate logins and access rights based on LDAP data.<\/li>\n<li>We enabled service partners and end users to grant or revoke access to AGFEO support directly from their AGFEO dashboard, with a simple click of a button.<\/li>\n<\/ul>\n<h3 class=\"wp-block-heading\"><strong>Flexible and scalable user management<\/strong><\/h3>\n<p>User accounts can be managed by a privileged user, called a tenant. Using tenants in macchina.io REMOTE, service partners can add their own user accounts to manage their own equipment and customers, without affecting the AGFEO database. This feature provides flexibility and scalability for user management, as well as security and isolation for different tenants.<\/p>\n<\/div>\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\"><strong>Seamless and secure authentication and authorization<\/strong><\/h3>\n<p>In order to make remote access easy and secure for all users and devices, we have integrated macchina.io REMOTE with all AGFEO accounts for service partners and end users.&nbsp;<\/p>\n<p>macchina.io REMOTE has a flexible <strong>multi factor authentication and authorization system<\/strong> based on permissions and roles. The authorization and authentication system controls which devices can be accessed and which actions can be performed by each user.<\/p>\n<p>We understand that end users or service partners may not want to give the AGFEO support team permanent access to their devices, especially if they are not experiencing any problems. That&#8217;s why we&#8217;ve made it easy for them to control when and how the AGFEO support team can access their devices.<\/p>\n<p>With macchina.io REMOTE, service partners and end users can grant or deny access to the AGFEO support team directly from their AGFEO dashboard, with a simple click of a button. In this way, they can decide when they need AGFEO support and when they want to keep their devices private. This feature ensures that everyone&#8217;s privacy is respected and that trust is maintained between all parties involved.<\/p>\n<\/div>\n<\/div>\n<p class=\"has-vivid-cyan-blue-color has-text-color has-link-color wp-elements-6cd29ad066d10ce5c8a65078635c83f1\"><strong>No more stress about remote access security. Macchina.io REMOTE gives you a plug-and-play solution and a multi-factor authentication and authorization system for your next project.<\/strong><\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<p>Check out our other Case Study: Telephony Systems Posts and get information on:<\/p>\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-fdcfc74e wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-fill\"><a class=\"wp-block-button__link has-luminous-vivid-amber-color has-text-color has-link-color wp-element-button\" href=\"https:\/\/macchina.io\/blog\/internet-of-things\/remote-access-phone-systems\/\">Remote access for service partners &#8211; Part 2<\/a><\/div>\n<\/div>\n<\/div>\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-fdcfc74e wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-fill\"><a class=\"wp-block-button__link has-luminous-vivid-amber-color has-text-color has-link-color wp-element-button\" href=\"https:\/\/macchina.io\/blog\/internet-of-things\/secure-iot-access-anywhere\/\">Remote access for end users &#8211; Part 3 <\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<h2 class=\"wp-block-heading has-text-align-center has-text-color has-link-color wp-elements-2103f9a13ff74dbce9461200559c566c\" style=\"color:#1a76b5\">FULL CONTROL OVER PBX SYSTEMS AND IOT DEVICES FROM ANYWHERE IN THE WORLD!<\/h2>\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-text-align-center\">Remote IoT device access behind a firewall is now easier than ever!<\/h3>\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li>Made in EU<\/li>\n<li>Open source SDK and device agent<\/li>\n<li>Self-hosted (on-prem or any cloud provider)<\/li>\n<li>Customize and integrate into your environment<\/li>\n<li>Pay only for what you use<\/li>\n<\/ul>\n<\/div>\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li>Powerful and resource efficient<\/li>\n<li>Access and control more than 100,000 devices<\/li>\n<li>Zero direct attack possibility<\/li>\n<li>Fine grained access control<\/li>\n<li>Multi factor authentication<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<h3 class=\"wp-block-heading has-text-align-center has-text-color has-link-color wp-elements-24db56f6e7be70c561703f971faaf04f\" style=\"color:#1a76b5\">ACCESS AND CONTROL YOUR IOT DEVICE REMOTELY IN LESS THAN 5 MINUTES! <\/h3>\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-75 is-style-fill\"><a class=\"wp-block-button__link has-luminous-vivid-amber-color has-text-color has-link-color wp-element-button\" href=\"https:\/\/macchina.io\/remote.html\">TRY NOW FOR FREE!<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Secure remote access to PBX systems (telephony) is complex. You need to protect your data, devices, network and allow all users remote and secure access. <\/p>\n","protected":false},"author":2,"featured_media":1201,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","_eb_attr":"","footnotes":""},"categories":[179,3],"tags":[6,33,30,29],"class_list":["post-1199","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-case-studies","category-internet-of-things","tag-internet-of-things-2","tag-iot","tag-remote-access","tag-security-2"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Secure Remote Access for Smart Infrastructure: A Case Study for Telephony Systems (Part 1) - macchina.io Blog<\/title>\n<meta name=\"description\" content=\"Secure remote access to PBX systems (telephony) is complex. You need to protect your data, devices, network and allow all users remote and secure access.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/macchina.io\/blog\/internet-of-things\/secure-remote-access-for-smart-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure Remote Access for Smart Infrastructure: A Case Study for Telephony Systems (Part 1) - macchina.io Blog\" \/>\n<meta property=\"og:description\" content=\"Secure remote access to PBX systems (telephony) is complex. You need to protect your data, devices, network and allow all users remote and secure access.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/macchina.io\/blog\/internet-of-things\/secure-remote-access-for-smart-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"macchina.io Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-19T12:24:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-23T07:23:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/macchina.io\/blog\/wp-content\/uploads\/2024\/02\/SecureRemoteAccessforSmartInfrastructure-scaled.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"590\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"G\u00fcnter Obiltschnig\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@macchina_io\" \/>\n<meta name=\"twitter:site\" content=\"@macchina_io\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"G\u00fcnter Obiltschnig\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/macchina.io\\\/blog\\\/internet-of-things\\\/secure-remote-access-for-smart-infrastructure\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/macchina.io\\\/blog\\\/internet-of-things\\\/secure-remote-access-for-smart-infrastructure\\\/\"},\"author\":{\"name\":\"G\u00fcnter Obiltschnig\",\"@id\":\"https:\\\/\\\/macchina.io\\\/blog\\\/#\\\/schema\\\/person\\\/85e732123d4102689b6436b2807a626b\"},\"headline\":\"Secure Remote Access for Smart Infrastructure: A Case Study for Telephony Systems (Part 1)\",\"datePublished\":\"2024-02-19T12:24:00+00:00\",\"dateModified\":\"2026-03-23T07:23:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/macchina.io\\\/blog\\\/internet-of-things\\\/secure-remote-access-for-smart-infrastructure\\\/\"},\"wordCount\":643,\"publisher\":{\"@id\":\"https:\\\/\\\/macchina.io\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/macchina.io\\\/blog\\\/internet-of-things\\\/secure-remote-access-for-smart-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/macchina.io\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/SecureRemoteAccessforSmartInfrastructure-scaled.webp\",\"keywords\":[\"internet of things\",\"iot\",\"remote access\",\"security\"],\"articleSection\":[\"Case Studies\",\"Internet of Things\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/macchina.io\\\/blog\\\/internet-of-things\\\/secure-remote-access-for-smart-infrastructure\\\/\",\"url\":\"https:\\\/\\\/macchina.io\\\/blog\\\/internet-of-things\\\/secure-remote-access-for-smart-infrastructure\\\/\",\"name\":\"Secure Remote Access for Smart Infrastructure: A Case Study for Telephony Systems (Part 1) - macchina.io Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/macchina.io\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/macchina.io\\\/blog\\\/internet-of-things\\\/secure-remote-access-for-smart-infrastructure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/macchina.io\\\/blog\\\/internet-of-things\\\/secure-remote-access-for-smart-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/macchina.io\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/SecureRemoteAccessforSmartInfrastructure-scaled.webp\",\"datePublished\":\"2024-02-19T12:24:00+00:00\",\"dateModified\":\"2026-03-23T07:23:16+00:00\",\"description\":\"Secure remote access to PBX systems (telephony) is complex. You need to protect your data, devices, network and allow all users remote and secure access.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/macchina.io\\\/blog\\\/internet-of-things\\\/secure-remote-access-for-smart-infrastructure\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/macchina.io\\\/blog\\\/internet-of-things\\\/secure-remote-access-for-smart-infrastructure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/macchina.io\\\/blog\\\/internet-of-things\\\/secure-remote-access-for-smart-infrastructure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/macchina.io\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/SecureRemoteAccessforSmartInfrastructure-scaled.webp\",\"contentUrl\":\"https:\\\/\\\/macchina.io\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/SecureRemoteAccessforSmartInfrastructure-scaled.webp\",\"width\":1024,\"height\":590,\"caption\":\"Secure Remote Access for Smart Infrastructure - Infographic Shows IOT Remote Access to PBX Systems\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/macchina.io\\\/blog\\\/internet-of-things\\\/secure-remote-access-for-smart-infrastructure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/macchina.io\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Secure Remote Access for Smart Infrastructure: A Case Study for Telephony Systems (Part 1)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/macchina.io\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/macchina.io\\\/blog\\\/\",\"name\":\"macchina.io Blog\",\"description\":\"Internet of Things, edge computing, IoT device software, C++\",\"publisher\":{\"@id\":\"https:\\\/\\\/macchina.io\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/macchina.io\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/macchina.io\\\/blog\\\/#organization\",\"name\":\"macchina.io\",\"url\":\"https:\\\/\\\/macchina.io\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/macchina.io\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/macchina.io\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/macchina.io_emp_logo.png\",\"contentUrl\":\"https:\\\/\\\/macchina.io\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/macchina.io_emp_logo.png\",\"width\":1537,\"height\":529,\"caption\":\"macchina.io\"},\"image\":{\"@id\":\"https:\\\/\\\/macchina.io\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/macchina_io\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/37869369\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/macchina.io\\\/blog\\\/#\\\/schema\\\/person\\\/85e732123d4102689b6436b2807a626b\",\"name\":\"G\u00fcnter Obiltschnig\",\"sameAs\":[\"http:\\\/\\\/www.appinf.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secure Remote Access for Smart Infrastructure: A Case Study for Telephony Systems (Part 1) - macchina.io Blog","description":"Secure remote access to PBX systems (telephony) is complex. You need to protect your data, devices, network and allow all users remote and secure access.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/macchina.io\/blog\/internet-of-things\/secure-remote-access-for-smart-infrastructure\/","og_locale":"en_US","og_type":"article","og_title":"Secure Remote Access for Smart Infrastructure: A Case Study for Telephony Systems (Part 1) - macchina.io Blog","og_description":"Secure remote access to PBX systems (telephony) is complex. You need to protect your data, devices, network and allow all users remote and secure access.","og_url":"https:\/\/macchina.io\/blog\/internet-of-things\/secure-remote-access-for-smart-infrastructure\/","og_site_name":"macchina.io Blog","article_published_time":"2024-02-19T12:24:00+00:00","article_modified_time":"2026-03-23T07:23:16+00:00","og_image":[{"width":1024,"height":590,"url":"https:\/\/macchina.io\/blog\/wp-content\/uploads\/2024\/02\/SecureRemoteAccessforSmartInfrastructure-scaled.webp","type":"image\/webp"}],"author":"G\u00fcnter Obiltschnig","twitter_card":"summary_large_image","twitter_creator":"@macchina_io","twitter_site":"@macchina_io","twitter_misc":{"Written by":"G\u00fcnter Obiltschnig","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/macchina.io\/blog\/internet-of-things\/secure-remote-access-for-smart-infrastructure\/#article","isPartOf":{"@id":"https:\/\/macchina.io\/blog\/internet-of-things\/secure-remote-access-for-smart-infrastructure\/"},"author":{"name":"G\u00fcnter Obiltschnig","@id":"https:\/\/macchina.io\/blog\/#\/schema\/person\/85e732123d4102689b6436b2807a626b"},"headline":"Secure Remote Access for Smart Infrastructure: A Case Study for Telephony Systems (Part 1)","datePublished":"2024-02-19T12:24:00+00:00","dateModified":"2026-03-23T07:23:16+00:00","mainEntityOfPage":{"@id":"https:\/\/macchina.io\/blog\/internet-of-things\/secure-remote-access-for-smart-infrastructure\/"},"wordCount":643,"publisher":{"@id":"https:\/\/macchina.io\/blog\/#organization"},"image":{"@id":"https:\/\/macchina.io\/blog\/internet-of-things\/secure-remote-access-for-smart-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/macchina.io\/blog\/wp-content\/uploads\/2024\/02\/SecureRemoteAccessforSmartInfrastructure-scaled.webp","keywords":["internet of things","iot","remote access","security"],"articleSection":["Case Studies","Internet of Things"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/macchina.io\/blog\/internet-of-things\/secure-remote-access-for-smart-infrastructure\/","url":"https:\/\/macchina.io\/blog\/internet-of-things\/secure-remote-access-for-smart-infrastructure\/","name":"Secure Remote Access for Smart Infrastructure: A Case Study for Telephony Systems (Part 1) - macchina.io Blog","isPartOf":{"@id":"https:\/\/macchina.io\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/macchina.io\/blog\/internet-of-things\/secure-remote-access-for-smart-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/macchina.io\/blog\/internet-of-things\/secure-remote-access-for-smart-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/macchina.io\/blog\/wp-content\/uploads\/2024\/02\/SecureRemoteAccessforSmartInfrastructure-scaled.webp","datePublished":"2024-02-19T12:24:00+00:00","dateModified":"2026-03-23T07:23:16+00:00","description":"Secure remote access to PBX systems (telephony) is complex. You need to protect your data, devices, network and allow all users remote and secure access.","breadcrumb":{"@id":"https:\/\/macchina.io\/blog\/internet-of-things\/secure-remote-access-for-smart-infrastructure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/macchina.io\/blog\/internet-of-things\/secure-remote-access-for-smart-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/macchina.io\/blog\/internet-of-things\/secure-remote-access-for-smart-infrastructure\/#primaryimage","url":"https:\/\/macchina.io\/blog\/wp-content\/uploads\/2024\/02\/SecureRemoteAccessforSmartInfrastructure-scaled.webp","contentUrl":"https:\/\/macchina.io\/blog\/wp-content\/uploads\/2024\/02\/SecureRemoteAccessforSmartInfrastructure-scaled.webp","width":1024,"height":590,"caption":"Secure Remote Access for Smart Infrastructure - Infographic Shows IOT Remote Access to PBX Systems"},{"@type":"BreadcrumbList","@id":"https:\/\/macchina.io\/blog\/internet-of-things\/secure-remote-access-for-smart-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/macchina.io\/blog\/"},{"@type":"ListItem","position":2,"name":"Secure Remote Access for Smart Infrastructure: A Case Study for Telephony Systems (Part 1)"}]},{"@type":"WebSite","@id":"https:\/\/macchina.io\/blog\/#website","url":"https:\/\/macchina.io\/blog\/","name":"macchina.io Blog","description":"Internet of Things, edge computing, IoT device software, C++","publisher":{"@id":"https:\/\/macchina.io\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/macchina.io\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/macchina.io\/blog\/#organization","name":"macchina.io","url":"https:\/\/macchina.io\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/macchina.io\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/macchina.io\/blog\/wp-content\/uploads\/2018\/08\/macchina.io_emp_logo.png","contentUrl":"https:\/\/macchina.io\/blog\/wp-content\/uploads\/2018\/08\/macchina.io_emp_logo.png","width":1537,"height":529,"caption":"macchina.io"},"image":{"@id":"https:\/\/macchina.io\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/macchina_io","https:\/\/www.linkedin.com\/showcase\/37869369"]},{"@type":"Person","@id":"https:\/\/macchina.io\/blog\/#\/schema\/person\/85e732123d4102689b6436b2807a626b","name":"G\u00fcnter Obiltschnig","sameAs":["http:\/\/www.appinf.com"]}]}},"_links":{"self":[{"href":"https:\/\/macchina.io\/blog\/wp-json\/wp\/v2\/posts\/1199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/macchina.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/macchina.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/macchina.io\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/macchina.io\/blog\/wp-json\/wp\/v2\/comments?post=1199"}],"version-history":[{"count":19,"href":"https:\/\/macchina.io\/blog\/wp-json\/wp\/v2\/posts\/1199\/revisions"}],"predecessor-version":[{"id":1440,"href":"https:\/\/macchina.io\/blog\/wp-json\/wp\/v2\/posts\/1199\/revisions\/1440"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/macchina.io\/blog\/wp-json\/wp\/v2\/media\/1201"}],"wp:attachment":[{"href":"https:\/\/macchina.io\/blog\/wp-json\/wp\/v2\/media?parent=1199"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/macchina.io\/blog\/wp-json\/wp\/v2\/categories?post=1199"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/macchina.io\/blog\/wp-json\/wp\/v2\/tags?post=1199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}