This section describes how to configure the remote attestation (RA) function to allow an RA server to authenticate a device and determine whether the device is trustworthy.
In a trusted environment, after the RA function is enabled on a device that supports trusted boot, the device sends information to a remote RA server. The remote RA server then compares the information it receives with locally stored information to determine whether the device is trustworthy. Therefore, RA provides users with a method of remotely checking device trustworthiness.
Before configuring RA, complete the following tasks:
The system view is displayed.
The downloaded certificate is imported to the device.
The trusted management view is displayed.
RA is enabled.
A specified PKI domain is bound to RA.
PKI certificate information is updated.
The configuration is committed.
Return to the system view.
Return to the user view.
The TPM password is changed.
If the device needs to be rolled back to a version that does not support the configuration of the TPM password, run the set tpm password { slot slotId | all }command to restore the default TPM password Changeme_123 before the rollback.
After the set tpm password { slot slotId | all } command is run, the device must be restarted. Otherwise, the TPM cannot be accessed and the remote attestation function is unavailable.