15.4.4.4 Security Overwrite
(Ask a Question)Security overwrite ignores security settings imported into the Programming Data entry from Libero (via the JDC file) and uses settings imported from the SPM file on disk. After import, the external SPM file is no longer used by the Job Manager.
Security overwrite is available in HSM flow and non-HSM flow. In both flows, security policy is used from the overwrite, while key values follow these rules:
HSM Flow:
- Key values are always used from the keyset file.
Non-HSM Flow:
- Key values are used from the security settings of the security overwrite.
- For keys that were overwritten using
the
set_key
command (see Key Overwrite (Non-HSM Flow)), the key overwrite value is used.
For details, see the set_security_overwrite
and
remove_security_overwrite
Tcl commands in Tcl Interface.