What is the security model around the provisioning key that is embedded in the Balena image I download from the cloud interface for my application?
This article seems to indicate that the “provisioning key” is good for any activations.
- Are their ways to limit the number of times a balena image downloaded from the cloud portal can be used?
- Are their ways to rotate the provisioning key in the balena image if we suspect a leak?
- Is there a way to remove all “Secrets” from the balena images? And use a more manual workflow to register devices?