How is the following Secure Boot / Chain of Trust scenario usually handled? What are the precedents?
In most of the documentation/examples, the scenario is simple: the same company creates the device and the application software, sells the device with application software on it, and only their keys need to be accommodated.
However in our case: we manufacture i.MX 8X based devices. Our customers develop software applications for the devices, and then sell the devices with software to their customers.
Our keys are in the AHAB SRK. But we also need to accommodate our customers keys somewhere, so that they can sign their software updates...
We supply our customers with the SDK produced by Yocto, and the Linux rootfs. Our customers don't perform Yocto builds themselves. They build their application software using the SDK.
What precedents are there for how this scenario is usually handled, in terms of secure boot and whose keys are stored where? What is the terminology for the different parties?
Thank you
Peter