Skip to content

Commit 888dcf2

Browse files
authored
Merge pull request #196681 from jackrichins/patch-40
Remove maa-ehd claim
2 parents 4f3b872 + 19874e4 commit 888dcf2

File tree

1 file changed

+4
-9
lines changed

1 file changed

+4
-9
lines changed

includes/key-management-policy-grammar.md

Lines changed: 4 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
author: msmbaldwin
33
ms.service: key-vault
44
ms.topic: include
5-
ms.date: 03/21/2022
5+
ms.date: 04/29/2022
66
ms.author: mbaldwin
77
---
88

@@ -208,7 +208,7 @@ Conditions are collected into Authority statements and combined:
208208
Where:
209209

210210
- **authority**: An identifier for the authority making the claims. This identifier functions in the same fashion as the iss claim in a JSON Web Token. It indirectly references a key that signs the Environment Assertion.
211-
- **allOf**: One or more claim conditions that identify claims and values that must be satisfied in the environment assertion for the release policy to succeed. anyOf is also allowed. However, both are not allowed together.
211+
- **allOf**: One or more claim conditions that identify claims and values that must be satisfied in the environment assertion for the release policy to succeed. anyOf is also allowed. However, both aren't allowed together.
212212

213213
## Key Release Policy
214214

@@ -234,7 +234,7 @@ Release policy is an anyOf condition containing an array of key authorities:
234234

235235
## Encoding key release policy
236236

237-
Since key release policy is a JSON document, it is encoded when carried in requests and response to AKV to avoid the need to describe the complete language in Swagger definitions.
237+
Since key release policy is a JSON document, it's encoded when carried in requests and response to AKV to avoid the need to describe the complete language in Swagger definitions.
238238

239239
The encoding is as follows:
240240

@@ -247,9 +247,4 @@ The encoding is as follows:
247247

248248
## Environment Assertion
249249

250-
An Environment Assertion is a signed assertion, in JSON Web Token form, from a trusted authority that contains at least a key encryption key and one or more claims about the target environment (for example, TEE type, publisher, version) that are matched against the Key Release Policy. The KEK is a public RSA key owned by the target execution environment (and protected by it) that is used for key export, it must appear in one of, in preference order:
251-
252-
- The TEE keys claim (x-ms-runtime-claims/keys). This claim is a JSON object representing a JSON Web Key Set.
253-
- The Enclave Held Data claim (maa-ehd) claim. The maa-ehd claim is expected to contain a string that is the Base64 URL encoding of an array of octets that contain a JSON document; within this document, AKV requires that there be a keys element containing a JSON Web Key Set.
254-
255-
Within the JWKS, one of the keys must meet the requirements for use as an encryption key (key_use is "enc", or key_ops contains "encrypt"). The first suitable key is chosen.
250+
An Environment Assertion is a signed assertion, in JSON Web Token form, from a trusted authority. An Environment Asserting contains at least a key encryption key and one or more claims about the target environment (for example, TEE type, publisher, version) that are matched against the Key Release Policy. The key encryption key is a public RSA key owned and protected by the target execution environment that is used for key export. It must appear in the TEE keys claim (x-ms-runtime/keys). This claim is a JSON object representing a JSON Web Key Set. Within the JWKS, one of the keys must meet the requirements for use as an encryption key (key_use is "enc", or key_ops contains "encrypt"). The first suitable key is chosen.

0 commit comments

Comments
 (0)