diff --git a/doc/links.rst b/doc/links.rst index ad2cce3ca7..3bee444b06 100644 --- a/doc/links.rst +++ b/doc/links.rst @@ -24,7 +24,7 @@ .. _NCS testing applications: https://docs.nordicsemi.com/bundle/ncs-2.7.0/page/nrf/test_and_optimize.html .. _Installing the nRF Connect SDK: https://docs.nordicsemi.com/bundle/ncs-2.7.0/page/nrf/installation/install_ncs.html .. _Board Configurator: https://docs.nordicsemi.com/bundle/nrf-connect-board-configurator/page/index.html -.. _Hardware unique key: https://docs.nordicsemi.com/bundle/ncs-latest/page/nrf/libraries/security/hw_unique_key.html#lib-hw-unique-key +.. _Trusted storage: https://docs.nordicsemi.com/bundle/ncs-latest/page/nrf/libraries/security/trusted_storage.html .. _Hardware flash write protection: https://docs.nordicsemi.com/bundle/ncs-latest/page/nrf/libraries/security/bootloader/fprotect.html .. ncs fixed links(do not update them) diff --git a/doc/releases_and_migration/migration_guide_v280.rst b/doc/releases_and_migration/migration_guide_v280.rst index 63773f4863..65f89208dc 100644 --- a/doc/releases_and_migration/migration_guide_v280.rst +++ b/doc/releases_and_migration/migration_guide_v280.rst @@ -36,7 +36,7 @@ The following logs are generated: [00:00:00.014,900] sid_mfg_parser_v8: MFG_SECP_256R1 import success [00:00:00.054,505] sid_mfg: Successfully parsed mfg data -The secure key storage is based on the `Hardware unique key`_ security library. +The secure key storage is based on the `Trusted storage`_ security library. After keys are imported into secure key storage, it is impossible to read their raw values. Therefore, once secure key storage is enabled in the firmware, it must remain enabled in all subsequent firmware versions. This feature is enabled by default in all Sidewalk samples. diff --git a/doc/samples/sid_end_device.rst b/doc/samples/sid_end_device.rst index fffd7043ff..c28561091c 100644 --- a/doc/samples/sid_end_device.rst +++ b/doc/samples/sid_end_device.rst @@ -132,14 +132,13 @@ For example: Secure Key Storage support ========================== -The Sidewalk Platform Abstraction Layer for nRF Connect SDK supports a secure key storage mechanism for Sidewalk keys, -ensuring they are stored persistently and confidentially. +The Sidewalk Platform Abstraction Layer for nRF Connect SDK supports a trusted storage mechanism for non-volatile Sidewalk keys, ensuring they are stored persistently and confidentially. The feature is enabled by default with the ``CONFIG_SIDEWALK_CRYPTO_PSA_KEY_STORAGE`` Kconfig option. .. note:: - Once secure keys are moved to secure key storage, it is impossible to retrieve them in plain text. - Therefore, you must not update your firmware to versions that do not support secure key storage. + Once keys are moved to trusted storage, it is impossible to retrieve them back into MFG storage. + Therefore, you must not update your firmware to versions that do not support trusted storage for non-volatile Sidewalk keys. Device Firmware Upgrade support ===============================