Authenticated JTAG Access provides a secure way
to control and protect access to a device's JTAG interface. If you enable this feature,
you must successfully authenticate before performing any JTAG operations (i.e. debug,
programming, device inspection).
This feature helps prevent unauthorized access to the device through JTAG, even if someone has physical access to the hardware.
To access an authenticated Jtag, follow steps below:
- Select the option called 'Authenticate JTAG' in the launch configuration.
- After enabling this option, select the Create button and provide a path for the JTAG file creation.
This generates a decryption file for opening your JTAG gate.
This file then automatically populates in the Authenticated JTAG File field. The debug session automatically uses this file to open the JTAG gate for enabling secure access.