Provisioning#

In addition to the following documents, which describe the two methods to establish the authenticity of devices wishing to join a mesh network, this section also provides details on Bluetooth Mesh Security Best Practices.