You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-edge/how-to-provision-devices-at-scale-linux-tpm.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,7 +50,9 @@ The tasks are as follows:
50
50
51
51
# [Physical device](#tab/physical-device)
52
52
53
-
A physical Linux device to be the IoT Edge device. This article assumes ownership of the TPM has been taken already and the endorsement key (EK) and storage root key (SRK) have been persisted. Follow the instructions relevant to your system to take ownership.
53
+
A physical Linux device to be the IoT Edge device.
54
+
55
+
This article assumes ownership of the TPM has been taken already and the endorsement key (EK) and storage root key (SRK) have been persisted. Follow the instructions relevant to your system to take ownership.
54
56
55
57
# [Virtual machine](#tab/virtual-machine)
56
58
@@ -167,6 +169,9 @@ In this section, you build a tool that you can use to retrieve the registration
167
169
168
170
In this section, you use the TPM2 software tools to retrieve the endorsement key for your TPM and then generate a unique registration ID.
169
171
172
+
> [!NOTE]
173
+
> This article previously used the `tpm_device_provision` tool from the IoT C SDK to generate provisioning info. If you previously used that tool, then be aware that the steps would generate a different registration ID for the same public endorsement key. If you need to replicate the previous behavior then refer to the C SDK's [tpm_device_provision tool](https://github.com/Azure/azure-iot-sdk-c/tree/main/provisioning_client/tools/tpm_device_provision).
174
+
170
175
# [Ubuntu / Debian / Raspberry Pi OS](#tab/ubuntu+debian+rpios)
171
176
172
177
1. Sign in to your device, and install the `tpm2-tools` package.
@@ -179,7 +184,7 @@ In this section, you use the TPM2 software tools to retrieve the endorsement key
printf"Gathering the registration information...\n\nRegistration Id:\n%s\n\nEndorsement Key:\n%s\n"$(sha256sum -b ek.pub | cut -d'' -f1 | sed -e 's/[^[:alnum:]]//g')$(base64 -w0 ek.pub)
183
188
```
184
189
185
190
1. The output window displays the device's **Registration ID** and the **Endorsement key**. Copy these values for use later when you create an individual enrollment for your device in the device provisioning service.
@@ -196,7 +201,7 @@ In this section, you use the TPM2 software tools to retrieve the endorsement key
1. The output window displays the device's **Registration ID** and the **Endorsement key**. Copy these values foruse later when you create an individual enrollment for your devicein the device provisioning service.
@@ -207,16 +212,11 @@ In this section, you use the TPM2 software tools to retrieve the endorsement key
207
212
<!-- end iotedge-1.4 -->
208
213
209
214
> [!TIP]
210
-
> If you don't want to use the TPM2 software tools to retrieve the information, you need to find another way to obtain the provisioning information. The endorsement key, which is unique to each TPM chip, is obtained from the TPM chip manufacturer associated with it. You can derive a unique registration ID for your TPM device. For example, you can create an SHA-256 hash of the endorsement key.
215
+
> If you don't want to use the TPM2 software tools to retrieve the information, you need to find another way to obtain the provisioning information. The endorsement key, which is unique to each TPM chip, is obtained from the TPM chip manufacturer associated with it. You can derive a unique registration ID for your TPM device. For example, as shown above you can create an SHA-256 hash of the endorsement key.
211
216
212
217
213
218
After you have your registration ID and endorsement key, you're ready to continue.
214
219
215
-
> [!NOTE]
216
-
> The Device Provisioning Service only uses the public part of the EK (EK_pub) to identify and enroll devices. It does not check the SRK or owner, so "clearing" the SRK to transfer ownership erases customer data, but the EK (and other vendor data) is preserved and the device will still be recognized by the Device Provisioning Service when it connects to provision.
217
-
>
218
-
> For an overview of the provisioning process with DPS see the documentation on [TPM attestation](../iot-dps/concepts-tpm-attestation.md).
219
-
220
220
<!-- Create an enrollment for your device using TPM provisioning information H2 and content -->
0 commit comments