Authenticated JTAG Access provides a secure
way to control and protect access to a device's JTAG interface. When this feature is
enabled, you must successfully authenticate before performing any JTAG operations such
as debug, programming, or device inspection.
This feature helps prevent unauthorized access to the device through JTAG, even if someone has physical access to the hardware.
To access an authenticated Jtag, follow steps below:
- Select the option called 'Authenticate JTAG' in the launch configuration.
- After enabling this option, select the Create button and provide a path for the JTAG file to be
created. This will generate a decryption file for opening your JTAG gate.
This file is then automatically populated in the Authenticated JTAG File field. The debug session will automatically use this file to open the JTAG gate for enabling secure access.