Skip to content

Commit a44c103

Browse files
authored
Merge pull request #206390 from fcabrera23/eflow-dtpm-fixes
Fixes starting doc
2 parents ae9ddc7 + e365d4b commit a44c103

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/iot-edge/how-to-access-dtpm.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -14,29 +14,29 @@ services: iot-edge
1414

1515
[!INCLUDE [iot-edge-version-all-supported](../../includes/iot-edge-version-all-supported.md)]
1616

17-
Trusted platform module (TPM) technology is a technology designed to provide hardware-based, security-related functions. A TPM chip is a secure crypto-processor that is designed to carry out cryptographic operations. The Azure IoT Edge for Linux on Windows (EFLOW) virtual machine doesn't support vTPM. However, the user can enable or disable the TPM passthrough feature, that allows the EFLOW virtual machine to use the Windows host OS TPM. The TPM passthrough feature enables two main scenarios:
17+
A Trusted platform module (TPM) chip is a secure crypto-processor that is designed to carry out cryptographic operations. This technology is designed to provide hardware-based, security-related functions. The Azure IoT Edge for Linux on Windows (EFLOW) virtual machine doesn't have a virtual TPMs attached to the VM. However, the user can enable or disable the TPM passthrough feature, that allows the EFLOW virtual machine to use the Windows host OS TPM. The TPM passthrough feature enables two main scenarios:
1818

1919
- Use TPM technology for IoT Edge device provisioning using Device Provision Service (DPS)
2020
- Read-only access to cryptographic keys stored inside the TPM.
2121

22-
This article describes how to develop a sample code in C# to read cryptographic keys stored inside the TPM.
22+
This article describes how to develop a sample code in C# to read cryptographic keys stored inside the device TPM.
2323

2424
> [!IMPORTANT]
2525
> The access to the TPM keys is limited to read-only. If you want to write keys to the TPM, you need to do it from the Windows host OS.
2626
2727
## Prerequisites
2828

29-
- A Windows host OS with a TPM or vTPM
29+
- A Windows host OS with a TPM or vTPM (ig using Windows host OS virtual machine).
3030
- EFLOW virtual machine with TPM passthrough enabled. Using an elevated PowerShell session, use `Set-EflowVmFeature -feature "DpsTpm" -enable` to enable TPM passthrough. For more information, see [Set-EflowVmFeature to enable TPM passthrough](./reference-iot-edge-for-linux-on-windows-functions.md#set-eflowvmfeature).
3131
- Ensure that the NV index (default index=3001) is initialized with 8 bytes of data. The default AuthValue used by the sample is {1,2,3,4,5,6,7,8} which corresponds to the NV (Windows) Sample in the TSS.MSR libraries when writing to the TPM. All index initialization must take place on the Windows Host before reading from the EFLOW VM. For more information about TPM samples, see [TSS.MSR](https://github.com/microsoft/TSS.MSR).
3232

33+
> [!WARNING]
34+
> Enabling TPM passthrough to the virtual machine may increase security risks.
35+
3336
## Create the dTPM executable
3437

3538
The following steps show you how to create a sample executable to access a TPM index from the EFLOW VM. For more information about EFLOW TPM passthrough, see [Azure IoT Edge for Linux on Windows Security](./iot-edge-for-linux-on-windows-security.md).
3639

37-
> [!WARNING]
38-
> Enabling TPM passthrough to the virtual machine may increase security risks.
39-
4040
1. Open Visual Studio 2019 or 2022.
4141

4242
1. Select **Create a new project**.

0 commit comments

Comments
 (0)