You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -622,14 +622,39 @@ Create a secure route with edge TLS termination for Trustee. External ingress tr
622
622
623
623
### Configure attestation policies
624
624
625
-
You can configure the following attestation policy settings:
625
+
Configure the following attestation policy settings:
626
626
627
-
**Reference values** (Optional)
627
+
**Configure reference values**
628
628
629
629
You can configure reference values for the Reference Value Provider Service (RVPS) by specifying the trusted digests of your hardware platform.
630
630
631
631
The client collects measurements from the running software, the Trusted Execution Environment (TEE) hardware and firmware and it submits a quote with the claims to the Attestation Server. These measurements must match the trusted digests registered to the Trustee. This process ensures that the confidential VM (CVM) is running the expected software stack and hasn't been tampered with.
632
632
633
+
1. Create an `rvps-configmap.yaml` manifest file:
634
+
635
+
```
636
+
apiVersion: v1
637
+
kind: ConfigMap
638
+
metadata:
639
+
name: rvps-reference-values
640
+
namespace: trustee-operator-system
641
+
data:
642
+
reference-values.json: |
643
+
[
644
+
]
645
+
```
646
+
647
+
For `reference-values.json` specify the trusted digests for your hardware platform if required. Otherwise, leave it empty.
648
+
649
+
1. Create the RVPS config map by running the following command:
650
+
651
+
`$ oc apply -f rvps-configmap.yaml`
652
+
653
+
654
+
655
+
656
+
<!--
657
+
633
658
**Secret with custom keys for clients** (Optional)
634
659
635
660
You can create a secret that contains one or more custom keys for Trustee clients.
@@ -640,14 +665,106 @@ You must configure a policy for the Trustee policy engine to determine which res
640
665
641
666
Don't confuse the Trustee policy engine with the Attestation Service policy engine, which determines the validity of TEE evidence.
642
667
643
-
**Attestation policy** (Optional)
668
+
-->
669
+
670
+
**Attestation policy**
644
671
645
672
You can overwrite the default attestation policy by creating your own attestation policy.
646
673
674
+
1. Create an attestation-policy.yaml manifest file according to the following example:
For `package policy`, The attestation policy follows the Open Policy Agent specification. In this example, the attestation policy compares the claims provided in the attestation report to the reference values registered in the RVPS database. The attestation process is successful only if all the values match.
731
+
732
+
1. Create the attestation policy config map by running the following command:
733
+
734
+
`$ oc apply -f attestation-policy.yaml`
735
+
736
+
647
737
**Provisioning Certificate Caching Service for TDX**
648
738
649
739
If your TEE is Intel Trust Domain Extensions (TDX), you must configure the Provisioning Certificate Caching Service (PCCS). The PCCS retrieves Provisioning Certification Key (PCK) certificates and caches them in a local database.
0 commit comments