| | 329 | == Endorsement Keys |
| | 330 | |
| | 331 | The TPM has endorsement keys (EK) but does not have certificates signed by Microchip, but rather expects you to sign your own. |
| | 332 | |
| | 333 | Microchip classifies the TPM SKU (ATTPM20P-H6MA1-10) as an "Industrial - Pre-gen EK" model. This means the Endorsement Keypair (the raw RSA and ECC cryptographic keys) is permanently generated and locked into the silicon at the factory. However, it does not include an X.509 certificate signed by Microchip's Certificate Authority (CA). |
| | 334 | |
| | 335 | It expects you to use the existing hardware keys to generate and sign your own certificates via an internal Public Key Infrastructure (PKI) if your threat model requires EK attestation. |
| | 336 | |
| | 337 | Many high-security environments actually prefer this method over factory-provisioned certificates. In this case, you won't be relying on certificates from Microchip and you have more strict control. You can also potentially embed more custom metadata into the certificate. |
| | 338 | |