Skip to content

Commit 03c500e

Browse files
committed
Added Lightbox & make MD syntax fix
1 parent 390f42e commit 03c500e

File tree

1 file changed

+3
-5
lines changed

1 file changed

+3
-5
lines changed

articles/confidential-computing/use-cases-scenarios.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -76,10 +76,7 @@ In this use-case we use a combination of Azure Confidential Compute technologies
7676
- Access using administrative protocols (RDP, SSH etc.) is limited to access from the Azure Bastion service that is integrated with Privileged Identity Management (PIM). The PIM policy requires a Conditional Access Policy that validates which sovereign region the administrator is accessing from.
7777
- All services log actions to Azure Monitor.
7878

79-
:::image type="content" source="media/use-cases-scenarios/restricted-workload.jpg" alt-text="Diagram showing workloads protected by Azure Confidential Compute and complemented with Azure configuration including Azure Policy and Conditional Access.":::
80-
81-
82-
[ ![Here's a cute kitten.](media/use-cases-scenarios/restricted-workload.jpg)](media/use-cases-scenarios/restricted-workload.jpg#lightbox)
79+
[![Diagram showing workloads protected by Azure Confidential Compute and complemented with Azure configuration including Azure Policy and Conditional Access.](media/use-cases-scenarios/restricted-workload.jpg)](media/use-cases-scenarios/restricted-workload.jpg#lightbox)
8380

8481
## Manufacturing – IP Protection
8582

@@ -105,7 +102,8 @@ The Tailspin Toys application itself is coded to periodically make a call to the
105102

106103
The attestation service returns cryptographically signed details from the hardware supporting the Contoso tenant to validate that the workload is running inside a confidential enclave as expected, the attestation is outside the control of the Contoso administrators and is based on the hardware root of trust that Confidential Compute provides.
107104

108-
:::image type="content" source="media/use-cases-scenarios/manufacturing-ip-protection.jpg" alt-text="Diagram showing a service provider running an industrial control suite from a toy manufacturer inside a Trusted Execution Environment (TEE).":::
105+
[![Diagram showing a service provider running an industrial control suite from a toy manufacturer inside a Trusted Execution Environment (TEE).](media/use-cases-scenarios/manufacturing-ip-protection.jpg)](media/use-cases-scenarios/manufacturing-ip-protection.jpg#lightbox)
106+
109107

110108
## Enhanced customer data privacy
111109

0 commit comments

Comments
 (0)