Programming Action Protection Locks (JTAG/SPI Slave)

There are three user lock bits to block the various programming actions on the bitstream. These locks can be temporarily unlocked by matching the FlashLock (UPK1) passcode. Bitstream can be used in any of three programming actions—authenticate, program, and verify. Each programming action is protected by one of the following dedicated lock bits listed in the table:

Table 1. Locks to Disable Bitstream Programming Actions
Lock Function when Active Description
Disable Bitstream Program Program action is disabled for JTAG and SPI Slave interfaces. Auto Programming and IAP Services are not affected.
Disable Bitstream Authentication Standalone authenticate action is disabled for JTAG and SPI Slave interfaces. Auto Programming and IAP Services are not affected. Note that this does not affect required authentication checks used in the program & verify programming actions.
Disable Bitstream Verify Standalone verify action is disabled for JTAG and SPI Slave interfaces. Auto Programming and IAP Services are not affected. Note that this lock does not affect verification executed during programming operations.

In the Configure Security Wizard, click Update policy to apply the programming action protection locks, as shown in the following figure.

Figure 1. Locks to Protect Bitstream Programming Actions