Skip to content

Commit 00e9a3e

Browse files
committed
Fix warning
Signed-off-by: Ming-Wei Shih <[email protected]>
1 parent 6641ffb commit 00e9a3e

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/confidential-computing/guest-attestation-confidential-vms-design.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Confidential VM guest attestation design detail
33
description: Learn about the design detail of the guest attestation for Azure confidential virtual machines.
44
author: mishih
55
ms.author: mishih
6-
ms.service: virtual-machines
7-
ms.subservice: confidential-computing
6+
ms.service: azure-virtual-machines
7+
ms.subservice: azure-confidential-computing
88
ms.topic: conceptual
99
ms.date: 05/21/2024
1010
ms.custom: template-concept
@@ -22,7 +22,7 @@ Azure confidential VMs utilize a vTPM-based design for the guest attestation. Th
2222

2323
The guest attestation process involves two main steps: evidence generation and evidence verification. The Azure confidential VM generates vTPM evidence, which is then verified by a trusted party (e.g., [Microsoft Azure Attestation (MAA)](https://azure.microsoft.com/products/azure-attestation)).
2424

25-
A relying party, such as [Azure Key Vault Premium](../security/fundamentals/key-management.md) or [Azure Key Vault Managed HSM](../key-vault/managed-hsm/overview.md), can assess the trustworthiness of the Azure confidential VM based on the verification results. If the VM is deemed trustworthy, the relying party can securely provision secrets to the VM, using mechanisms like [Secure Key Release](concept-skr-attestation.md).
25+
A relying party, such as [Azure Key Vault Premium](../security/fundamentals/key-management.md) or [Azure Key Vault Managed HSM](/azure/key-vault/managed-hsm/overview), can assess the trustworthiness of the Azure confidential VM based on the verification results. If the VM is deemed trustworthy, the relying party can securely provision secrets to the VM, using mechanisms like [Secure Key Release](concept-skr-attestation.md).
2626

2727
### vTPM Evidence
2828

0 commit comments

Comments
 (0)