Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit 91173bc7 authored by Kevin Hufnagle's avatar Kevin Hufnagle Committed by android-build-merger
Browse files

Merge \\\"docs: Expanded description of \\\"Key Attestation\\\" N Preview...

Merge \\\"docs: Expanded description of \\\"Key Attestation\\\" N Preview feature.\\\" into nyc-dev am: f6250cc7 am: ec9470fb
am: 6fd34598

Change-Id: I3058ec44a084efdfca794dbbbc00313c83753684
parents 7438fcfd 6fd34598
Loading
Loading
Loading
Loading
+2 −0
Original line number Original line Diff line number Diff line
@@ -220,6 +220,8 @@ toc:
      value: TV 录制
      value: TV 录制
    - name: zh-tw-lang
    - name: zh-tw-lang
      value: 電視錄製
      value: 電視錄製
  - title: Key Attestation
    path: /preview/features/key-attestation.html
  - title: Network Security Configuration
  - title: Network Security Configuration
    path: /preview/features/security-config.html
    path: /preview/features/security-config.html
    path_attributes:
    path_attributes:
+27 −38
Original line number Original line Diff line number Diff line
@@ -701,48 +701,37 @@ before unlock. All other data is unavailable until the User confirms their lock
For more information, see <a href="{@docRoot}preview/features/direct-boot.html">Direct Boot</a>.</p>
For more information, see <a href="{@docRoot}preview/features/direct-boot.html">Direct Boot</a>.</p>
</p>
</p>



<h2 id="key_attestation">Key Attestation</h2>
<h2 id="key_attestation">Key Attestation</h2>


<p>Hardware-backed keystores provide a much safer method to create, store,
<p>
and use cryptographic keys on Android devices. They protect keys from the
  Android N introduces <em>key attestation</em>, a new security tool that helps
Linux kernel, potential Android vulnerabilities, and extraction
  you make sure that the key pairs stored within a device's <a class=
from rooted devices.</p>
  "external-link" href=

  "https://source.android.com/security/keystore/"><em>hardware-backed
<p>To make it easier and more secure to use hardware-backed keystores,
  keystore</em></a> properly protect the sensitive information that your app
Android N introduces Key Attestation. Apps and off-devices can use Key
  uses. By using this tool, you gain additional confidence that your app
Attestation to strongly determine whether an RSA or EC key pair is
  interacts with keys that reside in secure hardware, even if the device
hardware-backed, what the properties of the key pair are, and what
  running your app is rooted. If you use keys from the hardware-backed keystore
  constraints are applied to its usage and validity. </p>
  in your apps, you should use this tool, particularly if you use the keys to

  verify sensitive information within your app.
<p>Apps and off-device services can request information about a key pair
</p>
through an X.509 attestation certificate which must be signed by a valid
attestation key. The attestation key is an ECDSA signing key which is
injected into the device’s hardware-backed keystore at the factory.
Therefore, an attestation certificate signed by a valid attestation
key confirms the existence of a hardware-backed keystore, along with
  details of key pairs in that keystore.</p>

<p>To ensure that the device is using a secure, official Android factory
image, Key Attestation requires that the device <a
class="external-link"
href="https://source.android.com/security/verifiedboot/verified-boot.html#bootloader_requirements">bootloader</a>
provide the following information to the <a class="external-link"
href="https://source.android.com/security/trusty/index.html">Trusted
Execution Environment (TEE)</a>:</p>

<ul>
<li>The OS version and patch level installed on the device</li>
<li>The <a href="https://source.android.com/security/verifiedboot/index.html"
class="external-link" >Verified Boot</a> public key and lock status</li>
  </ul>


<p>For more information about the hardware-backed keystore feature,
<p>
see the guide for <a href="https://source.android.com/security/keystore/"
  Key attestation allows you to verify that an RSA or EC key pair has been
class="external-link">Hardware-backed Keystore</a>.</p>
  created and stored in a device’s hardware-backed keystore within the device’s
  trusted execution environment (TEE). The tool also allows you to use an
  off-device service, such as your app's back-end server, to determine and
  strongly verify the uses and validity of the key pair. These features provide
  an additional level of security that protects the key pair, even if someone
  roots the device or compromises the security of the Android platform running
  on the device.
</p>


<p>In addition to Key Attestation, Android N also introduces
<p>
  fingerprint-bound keys that are not revoked on fingerprint enrollment.</p>
  For more information, see the
  <a href="{@docRoot}preview/features/key-attestation.html">Key Attestation</a>
  developer documentation.
</p>


<h2 id="network_security_config">Network Security Config</h2>
<h2 id="network_security_config">Network Security Config</h2>


+845 −0

File added.

Preview size limit exceeded, changes collapsed.