Intel® Agilex™ Device Security User Guide

ID 683823
Date 11/09/2021
Public

A newer version of this document is available. Customers should click here to go to the newest version.

Document Table of Contents

2. Authentication and Authorization

To enable the authentication features of an Intel® Agilex® device, you begin by using the Intel® Quartus® Prime Pro Edition software and associated tools to build a signature chain. A signature chain consists of a root key, one or more signing keys, and applicable authorizations. You apply the signature chain to your Intel® Quartus® Prime Pro Edition project and compiled programming files. Use the instructions in Device Provisioning to program your root key into Intel® Agilex® devices.

Did you find the information on this page useful?

Characters remaining:

Feedback Message