The document discusses different types of onboarding processes for Internet of Things (IoT) devices and identifies security, usability, granularity, and interoperability issues. It provides report cards grading the different onboarding types and identifies ways to improve the processes, such as applying a delegated authorization model and developing intuitive authorization ceremonies for constraining devices and apps. The ideal solution is to use secondary credentials like tokens instead of primary credentials where possible to improve security.