Specifications
Trusted Platform Module Quick Reference 7
Assuming Trusted Platform Module
Ownership
Once the TPM has been enabled, ownership must be assumed by using the
Infineon Security Platform Software. The owner/end user should follow the
steps listed below to take ownership of the TPM:
1. Start the system.
2. Launch the Infineon Security Platform Initialization Wizard.
3. Create Owner password (before creating any password, review the
Password Recommendations made earlier in this document).
4. Create a new Recovery Archive (note the file name and location).
5. Specify a Security Platform Emergency Recovery Token password and
location. (this password should not match the Owner password or any other
password).
6. Define where to save the Emergency Recovery Token (note the file
location and name).
7. The software will then create recovery archive files and finalize ownership
of the TPM.
8. After completing the Infineon Security Platform Initialization Wizard, the
Emergency Recovery Token (SPEmRecToken.xml) must be moved
to a
removable media (floppy, CDR, flash media, etc) if the file was not saved
to a removable media during installation. Once this is done, the removable
media should be stored in a secure location. No copies of this Emergency
Recovery Token file should remain on the system. If a copy remains on
the system, it could be used to compromise the security of the platform.
9. Launch the Infineon Security Platform User Initialization Wizard.
10. Create a Basic User password (this password is the most frequently used
and should not match any other password).
11. Select and configure Security Platform features for this user.
12. After completing the Infineon Security Platform User Initialization Wizard,
a copy of the Emergency Recovery Archive (SPEmRecArchive.xml)
should be copied to a removable media and stored in a secure location.
This procedure should be repeated after any password changes or the
addition of new users.
13. Restart the system.
14. To backup the keys for the EMBASSY Trust Suite, the Key Transfer
Manager software must be configured. Launch the Key Transfer Manager
from the program menu.
15. Follow the instructions and create and document the locations for both the
archive and restoration key files. The key archive should be located on a
removable media and stored in a secure location when not in use.