Techniques that enable devices in a network environment to automatically
obtain authentication without specialized human intervention during
device deployment include a device having a pre-configured security key
which a service facility uses to authenticate the device. These
techniques enable a service facility to associate pre-configured security
keys to owners/users of devices, and enable devices to be purchased
without any custom configuration, and enable devices to be attached to a
network and automatically obtain authentication and configuration based
on the identity of the owner of the devices.