15.4.4.4 Security Overwrite

Security overwrite ignores security settings imported into the Programming Data entry from Libero (via the JDC file) and uses settings imported from the SPM file on disk. After import, the external SPM file is no longer used by the Job Manager.

Security overwrite is available in HSM flow and non-HSM flow. In both flows, security policy is used from the overwrite, while key values follow these rules:

HSM Flow:

  • Key values are always used from the keyset file.

Non-HSM Flow:

  • Key values are used from the security settings of the security overwrite.
  • For keys that were overwritten using the set_key command (see 15.4.4.3 Key Overwrite (Non-HSM Flow)), the key overwrite value is used.

For details, see the set_security_overwrite and remove_security_overwrite Tcl commands in 15.4.8 Tcl Interface.