In this exercise, we’ll learn about what FDO is and review the key principles of Red Hat’s implimentation of secure device onboarding.
FDO, or FIDO Device Onboard is actually a specification for securely onboarding devices, specifically edge and IoT devices. It works to solve the fundamental challenge of “how do I know this edge device is mine, and hasn’t been tampered with”.
A few of the key design principles for FDO are:
Red Hat’s implimentation integrates with the Device Edge stack to provide the ability to securely onboard Device Edge at remote sites.
The FDO workflow involves 7 major steps:
In Red Hat’s implimenation of FDO, the ownership voucher steps are handled by the edge-simplified-installer
. We’ll provide the address of our manufacturing server, and the installer will handle the rest while applying our image to the edge device.
Once the device has reached its destination, steps 3-7 from above happen. For our lab today, we’ll be using the ‘all-in-one’ setup of FDO, so all the components will reside on the same system, however production implimentations will have the various functionality spread out across different systems.
A special thank you to Luis Arizmendi Alonso for his deep dives on FDO, which are referenced heavily throughout this workshop.
Navigation
Previous Exercise | Next Exercise |