Skip to content

Commit b814764

Browse files
FrancescoSerrlubos
authored andcommitted
doc: Updated nRF54H20 keys docs
Updated nRF54H20 keys docs. Signed-off-by: Francesco Domenico Servidio <[email protected]>
1 parent bc30cfa commit b814764

File tree

3 files changed

+22
-0
lines changed

3 files changed

+22
-0
lines changed

doc/nrf/app_dev/device_guides/nrf54h/ug_nrf54h20_custom_pcb.rst

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,8 @@ It is highly recommended to use the PCB layouts and component values provided by
2626
* The **P9** port cannot be used with internal or external pull-down resistors.
2727
* For optimal performance, the output impedance of the **P6** and **P7** ports should match the PCB and external device pin impedance.
2828

29+
.. _ug_nrf54h20_custom_pcb_board:
30+
2931
Prepare the configuration files for your custom board in the |NCS|
3032
******************************************************************
3133

@@ -47,6 +49,8 @@ See the following documentation pages for more information:
4749

4850
See :ref:`zephyr:board_porting_guide` for more information.
4951

52+
.. _ug_nrf54h20_custom_pcb_bicr:
53+
5054
Configure, generate, and program the BICR
5155
*****************************************
5256

doc/nrf/app_dev/device_guides/nrf54h/ug_nrf54h20_ironside.rst

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -698,6 +698,8 @@ The UICR.WDTSTART configuration consists of three sub-registers:
698698
This value determines the watchdog timeout period.
699699
The CRV must be at least 15 (0xF) to ensure proper watchdog operation.
700700

701+
.. _ug_nrf54h20_ironside_uicr_securestorage:
702+
701703
UICR.SECURESTORAGE
702704
==================
703705

doc/nrf/app_dev/device_guides/nrf54h/ug_nrf54h20_keys.rst

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,22 @@ Provisioning keys on the nRF54H20 SoC
77
:local:
88
:depth: 2
99

10+
This guide describes how to generate and provision cryptographic public keys on an nRF54H20 SoC in the Root of Trust (RoT) lifecycle state.
11+
It is intended for developers defining manifest signing keys for the application core, radio core, and OEM root.
12+
A successful provisioning makes the keys available to Secure Domain Firmware through PSA Crypto key identifiers.
13+
14+
Prerequisites
15+
=============
16+
17+
To follow this guide, your nRF54H20 device must meet the following requirement:
18+
19+
* On the nRF54H20 DK, you must :ref:`provision <ug_nrf54h20_gs_bringup_soc_bin>` the DK as described in the :ref:`ug_nrf54h20_gs` page.
20+
* On a custom nRF54H20-based device, you must :ref:`configure, generate, and program the BICR <ug_nrf54h20_custom_pcb_bicr>` as described in the :ref:`ug_nrf54h20_custom_pcb` page.
21+
* You must configure :ref:`ug_nrf54h20_ironside_uicr_securestorage` in your |ISE| UICR configuration.
22+
23+
Overview
24+
========
25+
1026
The keys provisioning workflow for the nRF54H20 SoC consists of two main steps:
1127

1228
1. Generating the required metadata using a script provided with the |NCS|.

0 commit comments

Comments
 (0)