The debug subsystem supports several methods for controlling JTAG debug access to the
device through the SWD interface through fuses.
- Open (default) – the debug authentication is bypassed when the device is passed
to the vendor for its SW development to allow simple debug. Recommended not to
deploy the device with this method.
- Authenticated Debug – only based on signed and authenticated debug request
(different per device). Accessed via Vendor ROT public key – debug request is
signed using the private key associated with the public key vendor ROT.
For more information on Root-of-Trust (ROT), see Chapter 12.