-
I've been playing around with device-attest-01 and tpm's to see what it is usable for. I feel that it's really under documented and quite hard to figure out. I've gotten stuck on attestation-ca-url , which as far as I see it is the url to the http service that is supposed to do the challenge against the tpm to verify that the tpm has access to the key, but here I'm stuck. This is supposed to be a http service on /attest that takes a tpmInfo json structure, but I can't find any traces of this anywhere in either the documentation or in the source about which service this is supposed to be. Are there any more information on what this service is supposed to be? Are there any example setups on how to use device-attest-01 and tpm's ? |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 3 replies
-
Hi @glance-, Thanks for the note. We are rolling out Linux TPM support (including attestation CAs) for device and client certificates, in our commercial product. If you're interested in that, feel free to reach out and we can show you what we offer there. And if there's more you'd like to see in open source, feel free to open an enhancement issue so we can track your request. |
Beta Was this translation helpful? Give feedback.
Hi @glance-,
Thanks for the note.
There is no support for
device-attest-01
TPM certificate flows in our open source packages.In open source, we support YubiKey and Apple MDA flows at the moment.
The TPM flow is more complex and it requires an attestation CA.
We are rolling out Linux TPM support (including attestation CAs) for device and client certificates, in our commercial product. If you're interested in that, feel free to reach out and we can show you what we offer there.
And if there's more you'd like to see in open source, feel free to open an enhancement issue so we can track your request.