Skip to content

Commit 6cc3914

Browse files
Merge pull request #224568 from msmbaldwin/akv-misc
Updates
2 parents 6489197 + 792fe3e commit 6cc3914

15 files changed

+138
-141
lines changed

articles/attestation/quickstart-portal.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Follow this quickstart to get started with Azure Attestation. Learn how to manag
1616

1717
## Prerequisites
1818

19-
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin. The user creating an attestation provider should have sufficient access levels on the subscription to create a resource (e.g: owner/contributor). Please refer [Azure built-in roles](../role-based-access-control/built-in-roles.md) for more information.
19+
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin. The user creating an attestation provider should have sufficient access levels on the subscription to create a resource (e.g: owner/contributor). For more information, see [Azure built-in roles](../role-based-access-control/built-in-roles.md).
2020

2121
## Attestation provider
2222

@@ -37,7 +37,7 @@ In this section, you'll create an attestation provider and configure it with eit
3737
- **Policy signer certificates file**: Don't upload the policy signer certificates file to configure the provider with unsigned policies.
3838

3939
1. After you provide the required inputs, select **Review+Create**.
40-
1. If there are validation issues, fix them and then select **Create**.
40+
1. Fix any validation issues and select **Create**.
4141

4242
### Create and configure the provider with signed policies
4343

@@ -54,7 +54,7 @@ In this section, you'll create an attestation provider and configure it with eit
5454
- **Policy signer certificates file**: Upload the policy signer certificates file to configure the attestation provider with signed policies. [See examples of policy signer certificates](./policy-signer-examples.md).
5555

5656
1. After you provide the required inputs, select **Review+Create**.
57-
1. If there are validation issues, fix them and then select **Create**.
57+
1. Fix any validation issues and select **Create**.
5858

5959
### View the attestation provider
6060

@@ -86,7 +86,7 @@ Follow the steps in this section to view, add, and delete policy signer certific
8686
1. Go to the Azure portal menu or the home page and select **All resources**.
8787
1. In the filter box, enter the attestation provider name.
8888
1. Select the attestation provider and go to the overview page.
89-
1. Select **Policy signer certificates** on the resource menu on the left side of the window or on the lower pane. If you see a prompt to select certificate for authentication, please click cancel to proceed.
89+
1. Select **Policy signer certificates** on the resource menu on the left side of the window or on the lower pane. If you see a prompt to select certificate for authentication, select cancel to proceed.
9090
1. Select **Download policy signer certificates**. The button will be disabled for attestation providers created without the policy signing requirement.
9191
1. The downloaded text file will have all certificates in a JWS format.
9292
1. Verify the certificate count and the downloaded certificates.
@@ -96,7 +96,7 @@ Follow the steps in this section to view, add, and delete policy signer certific
9696
1. Go to the Azure portal menu or the home page and select **All resources**.
9797
1. In the filter box, enter the attestation provider name.
9898
1. Select the attestation provider and go to the overview page.
99-
1. Select **Policy signer certificates** on the resource menu on the left side of the window or on the lower pane. If you see a prompt to select certificate for authentication, please click cancel to proceed.
99+
1. Select **Policy signer certificates** on the resource menu on the left side of the window or on the lower pane. If you see a prompt to select certificate for authentication, select cancel to proceed.
100100
1. Select **Add** on the upper menu. The button will be disabled for attestation providers created without the policy signing requirement.
101101
1. Upload the policy signer certificate file and select **Add**. [See examples of policy signer certificates](./policy-signer-examples.md).
102102

@@ -105,7 +105,7 @@ Follow the steps in this section to view, add, and delete policy signer certific
105105
1. Go to the Azure portal menu or the home page and select **All resources**.
106106
1. In the filter box, enter the attestation provider name.
107107
1. Select the attestation provider and go to the overview page.
108-
1. Select **Policy signer certificates** on the resource menu on the left side of the window or on the lower pane. If you see a prompt to select certificate for authentication, please click cancel to proceed.
108+
1. Select **Policy signer certificates** on the resource menu on the left side of the window or on the lower pane. If you see a prompt to select certificate for authentication, Select **Cancel** to proceed.
109109
1. Select **Delete** on the upper menu. The button will be disabled for attestation providers created without the policy signing requirement.
110110
1. Upload the policy signer certificate file and select **Delete**. [See examples of policy signer certificates](./policy-signer-examples.md).
111111

@@ -118,7 +118,7 @@ This section describes how to view an attestation policy and how to configure po
118118
1. Go to the Azure portal menu or the home page and select **All resources**.
119119
1. In the filter box, enter the attestation provider name.
120120
1. Select the attestation provider and go to the overview page.
121-
1. Select **Policy** on the resource menu on the left side of the window or on the lower pane. If you see a prompt to select certificate for authentication, please click cancel to proceed.
121+
1. Select **Policy** on the resource menu on the left side of the window or on the lower pane. If you see a prompt to select certificate for authentication, select **Cancel** to proceed.
122122
1. Select the preferred **Attestation Type** and view the **Current policy**.
123123

124124
### Configure an attestation policy
@@ -128,7 +128,7 @@ Follow these steps to upload a policy in JWT or text format if the attestation p
128128
1. Go to the Azure portal menu or the home page and select **All resources**.
129129
1. In the filter box, enter the attestation provider name.
130130
1. Select the attestation provider and go to the overview page.
131-
1. Select **Policy** on the resource menu on the left side of the window or on the lower pane. If you see a prompt to select certificate for authentication, please click cancel to proceed.
131+
1. Select **Policy** on the resource menu on the left side of the window or on the lower pane. If you see a prompt to select certificate for authentication, select **Cancel** proceed.
132132
1. Select **Configure** on the upper menu.
133133
1. Select **Policy Format** as **JWT** or as **Text**.
134134

articles/attestation/quickstart-powershell.md

Lines changed: 13 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: attestation
55
author: msmbaldwin
66
ms.service: attestation
77
ms.topic: overview
8-
ms.date: 08/31/2020
8+
ms.date: 01/23/2023
99
ms.author: mbaldwin
1010
ms.custom: devx-track-azurepowershell
1111

@@ -16,8 +16,8 @@ ms.custom: devx-track-azurepowershell
1616
Follow the below steps to create and configure an attestation provider using Azure PowerShell. See [Overview of Azure PowerShell](/powershell/azure/) for information on how to install and run Azure PowerShell.
1717

1818
> [!NOTE]
19-
> Az.Attestation module is now integrated into Az PowerShell module. Minimum version of Az module required to support attestation operations:
20-
- Az 6.5.0
19+
> The Az.Attestation PowerShell module is now integrated into Az PowerShell module. Minimum version of Az module required to support attestation operations:
20+
- Az PowerShell module 6.5.0
2121

2222
The PowerShell Gallery has deprecated Transport Layer Security (TLS) versions 1.0 and 1.1. TLS 1.2 or a later version is recommended. Hence you may receive the following errors:
2323

@@ -46,7 +46,7 @@ Set-AzContext -Subscription <subscription id>
4646

4747
## Register Microsoft.Attestation resource provider
4848

49-
Register the Microsoft.Attestation resource provider in subscription. For more information about Azure resource providers and how to configure and manage resources providers, see [Azure resource providers and types](../azure-resource-manager/management/resource-providers-and-types.md). Note that registering a resource provider is required only once for a subscription.
49+
Register the Microsoft.Attestation resource provider in subscription. For more information about Azure resource providers and how to configure and manage resources providers, see [Azure resource providers and types](../azure-resource-manager/management/resource-providers-and-types.md). Registering a resource provider is required only once for a subscription.
5050

5151
```powershell
5252
Register-AzResourceProvider -ProviderNamespace Microsoft.Attestation
@@ -59,7 +59,7 @@ Register-AzResourceProvider -ProviderNamespace Microsoft.Attestation
5959

6060
## Create an Azure resource group
6161

62-
Create a resource group for the attestation provider. Note that other Azure resources (including a virtual machine with client application instance) can be put in the same resource group.
62+
Create a resource group for the attestation provider. Other Azure resources (including a virtual machine with client application instance) can be put in the same resource group.
6363

6464
```powershell
6565
$location = "uksouth"
@@ -68,8 +68,7 @@ New-AzResourceGroup -Name $attestationResourceGroup -Location $location
6868
```
6969

7070
> [!NOTE]
71-
> Once an attestation provider is created in this resource group, an Azure AD user must have **Attestation Contributor** role on the provider to perform operations like policy configuration/ policy signer certificates management. These permissions can be also be inherited with roles such as **Owner** (wildcard permissions)/ **Contributor** (wildcard permissions) on the subscription/ resource group.
72-
71+
> Once an attestation provider is created in this resource group, an Azure AD user must have **Attestation Contributor** role on the provider to perform operations like policy configuration/ policy signer certificates management. These permissions can also be inherited with roles such as **Owner** (wildcard permissions)/ **Contributor** (wildcard permissions) on the subscription/ resource group.
7372
7473
## Create and manage an attestation provider
7574

@@ -94,7 +93,7 @@ Get-AzAttestation retrieves the attestation provider properties like status and
9493
Get-AzAttestation -Name $attestationProvider -ResourceGroupName $attestationResourceGroup
9594
```
9695

97-
The above command should produce an output like the one below:
96+
The above command should produce output in this format:
9897

9998
```
10099
Id:/subscriptions/MySubscriptionID/resourceGroups/MyResourceGroup/providers/Microsoft.Attestation/attestationProviders/MyAttestationProvider
@@ -121,14 +120,14 @@ In order to manage policies, an Azure AD user requires the following permissions
121120
- Microsoft.Attestation/attestationProviders/attestation/write
122121
- Microsoft.Attestation/attestationProviders/attestation/delete
123122

124-
To perform these actions, an Azure AD user must have **Attestation Contributor** role on the attestation provider. These permissions can be also be inherited with roles such as **Owner** (wildcard permissions)/ **Contributor** (wildcard permissions) on the subscription/ resource group.
123+
To perform these actions, an Azure AD user must have **Attestation Contributor** role on the attestation provider. These permissions can also be inherited with roles such as **Owner** (wildcard permissions)/ **Contributor** (wildcard permissions) on the subscription/ resource group.
125124

126125
In order to read policies, an Azure AD user requires the following permission for "Actions":
127126
- Microsoft.Attestation/attestationProviders/attestation/read
128127

129-
To perform this action, an Azure AD user must have **Attestation Reader** role on the attestation provider. The read permission can be also be inherited with roles such as **Reader** (wildcard permissions) on the subscription/ resource group.
128+
To perform this action, an Azure AD user must have **Attestation Reader** role on the attestation provider. The read permissions can also be inherited with roles such as **Reader** (wildcard permissions) on the subscription/ resource group.
130129

131-
Below PowerShell cmdlets provide policy management for an attestation provider (one TEE at a time).
130+
These PowerShell cmdlets provide policy management for an attestation provider (one TEE at a time).
132131

133132
Get-AzAttestationPolicy returns the current policy for the specified TEE. The cmdlet displays policy in both text and JWT format of the policy.
134133

@@ -161,7 +160,7 @@ Reset-AzAttestationPolicy -Name $attestationProvider -ResourceGroupName $attesta
161160

162161
## Policy signer certificates management
163162

164-
Below PowerShell cmdlets provide policy signer certificates management for an attestation provider:
163+
These PowerShell cmdlets provide policy signer certificates management for an attestation provider:
165164

166165
```powershell
167166
Get-AzAttestationPolicySigners -Name $attestationProvider -ResourceGroupName $attestationResourceGroup
@@ -171,9 +170,9 @@ Add-AzAttestationPolicySigner -Name $attestationProvider -ResourceGroupName $att
171170
Remove-AzAttestationPolicySigner -Name $attestationProvider -ResourceGroupName $attestationResourceGroup -Signer <signer>
172171
```
173172

174-
Policy signer certificate is a signed JWT with claim named "maa-policyCertificate". Value of the claim is a JWK which contains the trusted signing key to add. The JWT must be signed with private key corresponding to any of the existing policy signer certificates.
173+
Policy signer certificate is a signed JWT with claim named "maa-policyCertificate". Value of the claim is a JWK, which contains the trusted signing key to add. The JWT must be signed with private key corresponding to any of the existing policy signer certificates.
175174

176-
Note that all semantic manipulation of the policy signer certificate must be done outside of PowerShell. As far as PowerShell is concerned, it is a simple string.
175+
All semantic manipulation of the policy signer certificate must be done outside of PowerShell. As far as PowerShell is concerned, it is a simple string.
177176

178177
For policy signer certificate sample, see [examples of policy signer certificate](policy-signer-examples.md).
179178

articles/attestation/quickstart-template.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: attestation
77
ms.topic: quickstart
88
ms.custom: subject-armqs, devx-track-azurepowershell, mode-arm
99
ms.author: mbaldwin
10-
ms.date: 05/20/2021
10+
ms.date: 01/23/2023
1111
---
1212

1313
# Quickstart: Create an Azure Attestation provider with an ARM template

articles/attestation/tpm-attestation-sample-policies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.author: prsriva
1212
---
1313
# Examples of an attestation policy for TPM endpoint
1414

15-
Attestation policy is used to process the attestation evidence and determine whether Azure Attestation will issue an attestation token. Attestation token generation can be controlled with custom policies. Below are some examples of an attestation policy.
15+
Attestation policy is used to process the attestation evidence and determine whether Azure Attestation will issue an attestation token. Attestation token generation can be controlled with custom policies.
1616

1717
## Sample policy for TPM using Policy version 1.0
1818

0 commit comments

Comments
 (0)