After creating an attestation profile, you must associate it with the TPM-based template. This ensures that the gateways you enroll using the TPM-based template are tamper-detectable.
Prerequisites
You must have a valid attestation profile.
Procedure
Results
You have successfully associated the attestation profile to your TPM-based device template. You can now onboard your gateway using the TPM-based template.
What to do next
Onboard a gateway using the TPM-based authentication method. For more information, see
Onboard a Gateway Using TPM-Based Authentication. After on-boarding your gateway, go to
Audit Log in the VMware Pulse IoT Center console and verify that the following audit types are displayed:
- TPM Boot Attestation Succeeded
- Runtime Boot Attestation Succeeded
If there is an attestation failure, verify the following:
- Verify the Alerts tab for any alerts corresponding to the boot or runtime attestation.
- Verify the Properties tab of the device.
If there is a boot failure, the cause of the error is displayed. For example:
boot-is-tampered true boot-tamper-details: "PCR8 mismatched."
For a run-time failure, the cause of the error is displayed. For example:runtime-is-tampered true runtime-tamper-details: "Files with mis-matched digests: /etc/chrony.conf"