You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: platform/core-concepts.mdx
+11-13Lines changed: 11 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
updated_at: June 18, 2025
2
+
updated_at: June 23, 2025
3
3
title: Core Concepts
4
4
html_title: Smallstep Core Concepts
5
5
description: High-level overview of Smallstep platform components and concepts, and how they work together to protect your resources and provide strong assurance of device identity.
@@ -67,7 +67,7 @@ Once you have a high-assurance device inventory, you still need enrollment, rene
67
67
68
68
## Device Bootstrapping and Enrollment
69
69
70
-
The Smallstep Agent uses a **provisional identity** (eg. an MDM-issued certificate) to bootstrap with the Smallstep platform. On Linux, or in other cases where there is no MDM, a short-lived bootstrapping token can be used as a provisional identity.
70
+
The Smallstep Agent uses a **provisional identity** (eg. an SCEP certificate issued via MDM) to bootstrap with the Smallstep platform. On Linux, or in other cases where there is no MDM, a short-lived bootstrapping token can be used as a provisional identity.
71
71
72
72
The provisional identity is a pre-enrollment credential that allows the device to begin the enrollment process and potentially be auto-approved. Note that a device inventory must already be imported or synced (eg. from an MDM) before bootstrapping.
The device’s Endorsement public key must already be approved in the Smallstep device inventory.
153
-
154
152
After enrollment, the resulting device identity certificate can be used for any first-party Apple services: Wi-Fi networks, Network Relays, VPNs, S/MIME, or client certificates for Safari.
155
153
156
154
# Key Protection
@@ -189,7 +187,7 @@ This attests that the client is in possession of the key, but it does not prove
189
187
190
188
Locally, with a CLI tool, it’s possible to confirm that the key the CA has issued a certificate for is stored in the Secure Enclave on the device.
191
189
192
-
This is the lowest level of key protection that Smallstep offers, and it’s only used for applications and use cases that do not support anything stronger. It increase attack cost to a level that is sufficient for some use cases, but its easier to bypass in practice than hardware attestations.
190
+
This is the lowest level of key protection that Smallstep offers, and it’s only used for applications and use cases that do not support anything stronger. It increases attack cost to a level that is sufficient for some use cases, but its easier to bypass in practice than hardware attestations.
193
191
194
192
This protection level depends on trusted compute primitives available on some platforms (e.g., system integrity protection, binary authorization).
195
193
@@ -203,7 +201,7 @@ With a hardware attested key, the secure element produces an attestation stateme
203
201
204
202
**Device attested keys**
205
203
206
-
This allows a third party to prove that a specific key is stored on *a specific device* or secure element. The device attestation includes cryptographic proof of the device’s serial number or other unique hardware identifier. Having the hardware identifier aids in bootstrapping and enrollment flows, but it doesn’t
204
+
This allows a third party to prove that a specific key is stored on *a specific device* or secure element. The device attestation includes cryptographic proof of the device’s serial number or other unique hardware identifier. Having the hardware identifier aids in zero-touch bootstrapping and enrollment flows.
207
205
208
206
- Trust profile: To keep these keys safe, you’re trusting the secure element manufacturer
209
207
@@ -217,17 +215,17 @@ This allows a third party to prove that a specific key is stored on *a specific
217
215
218
216
Because many client apps are unable to directly use hardware bound keys, Smallstep’s agent may issue **provisioned credentials** from the CA—using hardware bound key for authentication to the CA—as a compatibility tradeoff.
219
217
220
-
These provisioned credentials are short-lived. Their key protection level varies based on the application and operating system:
218
+
These provisioned credentials are short-lived. Their key attestation level varies based on the application and operating system:
221
219
222
220
|| macOS (Smallstep agent) | macOS (agentless) | Windows | Linux |
0 commit comments