Events
Nov 19, 11 PM - Nov 21, 11 PM
Gain the competitive edge you need with powerful AI and Cloud solutions by attending Microsoft Ignite online.
Register nowThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
The Trusted Platform Module (TPM) Base Services (TBS) feature centralizes TPM access across applications.
The TBS feature runs as a system service in Windows Server 2008, Windows Vista, or newer operating systems. It provides services as an API exposed through remote procedure calls (RPC). The TBS feature uses priorities specified by calling applications to cooperatively schedule TPM access.
Note
The TPM can be used for key storage operations. However, developers are encouraged to use the Key Storage APIs for these scenarios instead. The Key Storage APIs provide the functionality to create, sign or encrypt with, and persist cryptographic keys, and they are higher-level and easier to use than the TBS for these targeted scenarios.
TBS is intended for use by developers of applications based on the Windows operating systems. Developers should be familiar with the C and C++ programming languages and the Microsoft Windows programming environment.
The TBS feature requires at least Windows Server 2008 or Windows Vista operating system. For information about run-time requirements for a particular programming element, see the Requirements section of the reference page for that element.
Topic | Description |
---|---|
About TBS |
Key concepts and a high-level view of the TBS feature. |
Using TBS |
TBS processes and procedures for using the TBS API. |
TBS Reference |
Documentation about the TBS functions, structures, and return codes. |
Events
Nov 19, 11 PM - Nov 21, 11 PM
Gain the competitive edge you need with powerful AI and Cloud solutions by attending Microsoft Ignite online.
Register nowTraining
Module
Explore device encryption features - Training
This module explains the benefits of using encryption to protect drives and files against unauthorized access.