You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-edge/how-to-provision-devices-at-scale-linux-tpm.md
+48-58Lines changed: 48 additions & 58 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -141,31 +141,6 @@ After the installation is finished and you've signed back in to your VM, you're
141
141
142
142
---
143
143
144
-
<!-- iotedge-1.4 -->
145
-
:::moniker range=">=iotedge-1.4"
146
-
147
-
### Install the TPM2 Tools
148
-
1. Sign in to your device, and install the `tpm2-tools` package.
149
-
150
-
# [Ubuntu / Debian / Raspberry Pi OS](#tab/ubuntu+debian+rpios)
151
-
152
-
153
-
```bash
154
-
sudo apt-get install tpm2-tools
155
-
```
156
-
157
-
# [Red Hat Enterprise Linux](#tab/rhel)
158
-
159
-
160
-
```bash
161
-
sudo yum install tpm2-tools
162
-
```
163
-
164
-
---
165
-
166
-
:::moniker-end
167
-
<!-- end 1.4 -->
168
-
169
144
## Retrieve provisioning information for your TPM
170
145
171
146
<!-- 1.1 -->
@@ -192,12 +167,31 @@ In this section, you build a tool that you can use to retrieve the registration
192
167
<!-- iotedge-1.4 -->
193
168
:::moniker range=">=iotedge-1.4"
194
169
195
-
In this section, you use the TPM2 software tools to retrieve the endorsement key for your TPM and then generate a unique registration ID. This section corresponds with [Step 3: Device has firmware and software installed](../iot-dps/concepts-device-oem-security-practices.md#step-3-device-has-firmware-and-software-installed) in the process for [integrating a TPM into the manufacturing process](../iot-dps/concepts-device-oem-security-practices.md#integrating-a-tpm-into-the-manufacturing-process).
196
-
197
170
> [!NOTE]
198
171
> This article previously used the `tpm_device_provision` tool from the IoT C SDK to generate provisioning info. If you relied on that tool previously, then be aware the steps below generate a different registration ID for the same public endorsement key. If you need to recreate the registration ID as before then refer to how the C SDK's [tpm_device_provision tool](https://github.com/Azure/azure-iot-sdk-c/tree/main/provisioning_client/tools/tpm_device_provision) generates it. Be sure the registration ID for the individual enrollment in DPS matches the regisration ID the IoT Edge device is configured to use.
199
172
200
-
1. Run the script below to read the endorsement key, creating one if it does not already exist.
173
+
In this section, you use the TPM2 software tools to retrieve the endorsement key for your TPM and then generate a unique registration ID. This section corresponds with [Step 3: Device has firmware and software installed](../iot-dps/concepts-device-oem-security-practices.md#step-3-device-has-firmware-and-software-installed) in the process for [integrating a TPM into the manufacturing process](../iot-dps/concepts-device-oem-security-practices.md#integrating-a-tpm-into-the-manufacturing-process).
174
+
175
+
### Install the TPM2 Tools
176
+
Sign in to your device, and install the `tpm2-tools` package.
177
+
178
+
# [Ubuntu / Debian / Raspberry Pi OS](#tab/ubuntu+debian+rpios)
179
+
180
+
181
+
```bash
182
+
sudo apt-get install tpm2-tools
183
+
```
184
+
185
+
# [Red Hat Enterprise Linux](#tab/rhel)
186
+
187
+
188
+
```bash
189
+
sudo yum install tpm2-tools
190
+
```
191
+
192
+
---
193
+
194
+
Run the following script to read the endorsement key, creating one if it does not already exist.
201
195
202
196
```bash
203
197
#!/bin/sh
@@ -213,50 +207,46 @@ In this section, you use the TPM2 software tools to retrieve the endorsement key
1. The output window displays the device's **Endorsement key** and a unique **Registration ID**. Copy these values for use later when you create an individual enrollment for your device in the device provisioning service.
240
+
The output window displays the device's **Endorsement key** and a unique **Registration ID**. Copy these values for use later when you create an individual enrollment for your device in the device provisioning service.
250
241
251
242
:::moniker-end
252
243
<!-- end iotedge-1.4 -->
253
244
245
+
After you have your registration ID and endorsement key, you're ready to continue.
246
+
254
247
> [!TIP]
255
248
> If you don't want to use the TPM2 software tools to retrieve the information, you need to find another way to obtain the provisioning information. The endorsement key, which is unique to each TPM chip, is obtained from the TPM chip manufacturer associated with it. You can derive a unique registration ID for your TPM device. For example, as shown above you can create an SHA-256 hash of the endorsement key.
256
249
257
-
258
-
After you have your registration ID and endorsement key, you're ready to continue.
259
-
260
250
<!-- Create an enrollment for your device using TPM provisioning information H2 and content -->
0 commit comments