Skip to content

Commit 0d7ea69

Browse files
committed
Updates
1 parent 2710ec5 commit 0d7ea69

File tree

1 file changed

+13
-13
lines changed

1 file changed

+13
-13
lines changed

articles/attestation/claim-sets.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -12,15 +12,15 @@ ms.author: mbaldwin
1212
---
1313
# Claim sets
1414

15-
Claims generated in the process of attesting enclaves using Microsoft Azure Attestation can be divided into the below categories:
15+
Claims generated in the process of attesting enclaves using Microsoft Azure Attestation can be divided into these categories:
1616

1717
- **Incoming claims**: The claims generated by Microsoft Azure Attestation after parsing the attestation evidence and can be used by policy authors to define authorization rules in a custom policy
1818

1919
- **Outgoing claims**: The claims generated by Azure Attestation and included in the attestation token
2020

2121
- **Property claims**: The claims created as an output by Azure Attestation. It contains all the claims that represent properties of the attestation token, such as encoding of the report, validity duration of the report, and so on.
2222

23-
## Incoming claims
23+
## Incoming claims
2424

2525
### SGX attestation
2626

@@ -42,7 +42,7 @@ Claims to be used by policy authors to define authorization rules in an SGX atte
4242

4343
When an enclave author prefers to rotate MRSIGNER for security reasons, Azure Attestation policy must be updated to support the new and old MRSIGNER values before the binaries are updated. Otherwise authorization checks will fail resulting in attestation failures.
4444

45-
Attestation policy must be updated using the below format.
45+
Attestation policy must be updated using the format below.
4646

4747
#### Before key rotation
4848

@@ -87,10 +87,10 @@ Claims to be used by policy authors to define authorization rules in an SGX atte
8787
8888
The enclave author assigns a Security Version Number (SVN) to each version of the SGX enclave. When a security issue is discovered in the enclave code, enclave author increments the SVN value post vulnerability fix. To prevent interacting with insecure enclave code, customers can add a validation rule in the attestation policy. If the SVN of the enclave code does not match the version recommended by the enclave author, attestation will fail.
8989
90-
Below claims are considered deprecated but are fully supported and will continue to be included in the future. It is recommended to use the non-deprecated claim names.
90+
These claims are considered deprecated but are fully supported and will continue to be included in the future. It is recommended to use the non-deprecated claim names:
9191
9292
Deprecated claim | Recommended claim
93-
--- | ---
93+
--- | ---|
9494
$is-debuggable | x-ms-sgx-is-debuggable
9595
$product-id | x-ms-sgx-product-id
9696
$sgx-mrsigner | x-ms-sgx-mrsigner
@@ -114,7 +114,7 @@ Claims to be used by policy authors to define authorization rules in a TPM attes
114114
115115
### VBS attestation
116116
117-
In addition to the TPM attestation policy claims, below claims can be used by policy authors to define authorization rules in a VBS attestation policy.
117+
In addition to the TPM attestation policy claims, these claims can be used by policy authors to define authorization rules in a VBS attestation policy:
118118
119119
- **enclaveAuthorId**: String value containing the Base64Url encoded value of the enclave author id-The author identifier of the primary module for the enclave
120120
- **enclaveImageId**: String value containing the Base64Url encoded value of the enclave Image id-The image identifier of the primary module for the enclave
@@ -124,11 +124,11 @@ In addition to the TPM attestation policy claims, below claims can be used by po
124124
- **enclavePlatformSvn**: Integer value containing the security version number of the platform that hosts the enclave
125125
- **enclaveFlags**: The enclaveFlags claim is an Integer value containing Flags that describe the runtime policy for the enclave
126126
127-
## Outgoing claims
127+
## Outgoing claims
128128
129129
### Common for all attestation types
130130
131-
Azure Attestation includes the below claims in the attestation token for all attestation types.
131+
Azure Attestation includes these claims in the attestation token for all attestation types:
132132
133133
- **x-ms-ver**: JWT schema version (expected to be "1.0")
134134
- **x-ms-attestation-type**: String value representing attestation type
@@ -145,7 +145,7 @@ Below claim names are used from [IETF JWT specification](https://tools.ietf.org/
145145
- **"exp" (Expiration Time) Claim** - Expiration time after which the JWT must not be accepted for processing
146146
- **"nbf" (Not Before) Claim** - Not Before time before which the JWT must not be accepted for processing
147147
148-
Below claim names are used from [IETF EAT draft specification](https://tools.ietf.org/html/draft-ietf-rats-eat-03#page-9)
148+
These claim names are used from [IETF EAT draft specification](https://tools.ietf.org/html/draft-ietf-rats-eat-03#page-9):
149149
150150
- **"Nonce claim" (nonce)** - An untransformed direct copy of an optional nonce value provided by a client
151151
@@ -162,7 +162,7 @@ rp_data | nonce
162162
163163
### SGX attestation
164164
165-
Below claims are generated and included in the attestation token by the service for SGX attestation.
165+
These caims are generated and included in the attestation token by the service for SGX attestation:
166166
167167
- **x-ms-sgx-is-debuggable**: A Boolean, which indicates whether or not the enclave has debugging enabled or not
168168
- **x-ms-sgx-product-id**: Product ID value of the SGX enclave
@@ -180,17 +180,17 @@ Below claims are generated and included in the attestation token by the service
180180
- **tcbinfohash**: SHA256 value of the TCB Info collateral
181181
- **x-ms-sgx-report-data**: SGX enclave report data field (usually SHA256 hash of x-ms-sgx-ehd)
182182
183-
Below claims will appear only in the attestation token generated for Intel® Xeon® Scalable processor-based server platforms. The claims will not appear if the SGX enclave is not configured with [Key Separation and Sharing Support](https://github.com/openenclave/openenclave/issues/3054). The claim definitions can be found [here](https://github.com/openenclave/openenclave/issues/3054)
183+
These claims will appear only in the attestation token generated for Intel® Xeon® Scalable processor-based server platforms. The claims will not appear if the SGX enclave is not configured with [Key Separation and Sharing Support](https://github.com/openenclave/openenclave/issues/3054). The claim definitions can be found [here](https://github.com/openenclave/openenclave/issues/3054):
184184
185185
- **x-ms-sgx-config-id**
186186
- **x-ms-sgx-config-svn**
187187
- **x-ms-sgx-isv-extended-product-id**
188188
- **x-ms-sgx-isv-family-id**
189189
190-
Below claims are considered deprecated but are fully supported and will continue to be included in the future. It is recommended to use the non-deprecated claim names.
190+
These claims are considered deprecated, but are fully supported and will continue to be included in the future. It is recommended to use the non-deprecated claim names:
191191
192192
Deprecated claim | Recommended claim
193-
--- | ---
193+
--- | ---|
194194
$is-debuggable | x-ms-sgx-is-debuggable
195195
$product-id | x-ms-sgx-product-id
196196
$sgx-mrsigner | x-ms-sgx-mrsigner

0 commit comments

Comments
 (0)