You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Follow the below steps to create and configure an attestation provider using Azure PowerShell. See [Overview of Azure PowerShell](/powershell/azure/) for information on how to install and run Azure PowerShell.
17
17
18
18
> [!NOTE]
19
-
> Az.Attestation module is now integrated into Az PowerShell module. Minimum version of Az module required to support attestation operations:
19
+
> The Az.Attestation PowerShell module is now integrated into Az PowerShell module. Minimum version of Az module required to support attestation operations:
20
20
- Az PowerShell module 6.5.0
21
21
22
22
The PowerShell Gallery has deprecated Transport Layer Security (TLS) versions 1.0 and 1.1. TLS 1.2 or a later version is recommended. Hence you may receive the following errors:
@@ -121,14 +121,14 @@ In order to manage policies, an Azure AD user requires the following permissions
To perform these actions, an Azure AD user must have **Attestation Contributor** role on the attestation provider. These permissions can be also be inherited with roles such as **Owner** (wildcard permissions)/ **Contributor** (wildcard permissions) on the subscription/ resource group.
124
+
To perform these actions, an Azure AD user must have **Attestation Contributor** role on the attestation provider. These permissions can also be inherited with roles such as **Owner** (wildcard permissions)/ **Contributor** (wildcard permissions) on the subscription/ resource group.
125
125
126
126
In order to read policies, an Azure AD user requires the following permission for "Actions":
To perform this action, an Azure AD user must have **Attestation Reader** role on the attestation provider. The read permissions can be also be inherited with roles such as **Reader** (wildcard permissions) on the subscription/ resource group.
129
+
To perform this action, an Azure AD user must have **Attestation Reader** role on the attestation provider. The read permissions can also be inherited with roles such as **Reader** (wildcard permissions) on the subscription/ resource group.
130
130
131
-
Below PowerShell cmdlets provide policy management for an attestation provider (one TEE at a time).
131
+
These PowerShell cmdlets provide policy management for an attestation provider (one TEE at a time).
132
132
133
133
Get-AzAttestationPolicy returns the current policy for the specified TEE. The cmdlet displays policy in both text and JWT format of the policy.
Policy signer certificate is a signed JWT with claim named "maa-policyCertificate". Value of the claim is a JWK, which contains the trusted signing key to add. The JWT must be signed with private key corresponding to any of the existing policy signer certificates.
175
175
176
-
Note that all semantic manipulation of the policy signer certificate must be done outside of PowerShell. As far as PowerShell is concerned, it is a simple string.
176
+
All semantic manipulation of the policy signer certificate must be done outside of PowerShell. As far as PowerShell is concerned, it is a simple string.
177
177
178
178
For policy signer certificate sample, see [examples of policy signer certificate](policy-signer-examples.md).
Copy file name to clipboardExpand all lines: articles/attestation/troubleshoot-guide.md
+24-23Lines changed: 24 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ Error handling in Azure Attestation is implemented following [Microsoft REST API
17
17
18
18
If your issue isn't addressed in this article, you can also submit an Azure support request on the [Azure support page](https://azure.microsoft.com/support/options/).
19
19
20
-
## 1. HTTP–401: Unauthorized exception
20
+
## HTTP–401: Unauthorized exception
21
21
22
22
### HTTP status code
23
23
401
@@ -62,22 +62,22 @@ b. Refer to the guidance [here](../role-based-access-control/role-assignments-li
62
62
63
63
c. If you don't find an appropriate role assignment, follow the instructions in [here](../role-based-access-control/role-assignments-powershell.md)
64
64
65
-
## 2. HTTP – 400 errors
65
+
## HTTP – 400 errors
66
66
67
67
### HTTP status code
68
68
400
69
69
70
-
There are different reasons why a request may return 400. Below are some examples of errors returned by Azure Attestation APIs:
70
+
There are different reasons why a request may return 400. Here are some examples of errors returned by Azure Attestation APIs.
71
71
72
-
### 2.1. Attestation failure due to policy evaluation errors
72
+
### Attestation failure due to policy evaluation errors
73
73
74
-
Attestation policy includes authorization rules and issuance rules. Enclave evidence is evaluated based on the authorization rules. Issuance rules define the claims to be included in attestation token. If claims in enclave evidence do not comply with authorization rules, attest calls will return policy evaluation error.
74
+
Attestation policy includes authorization rules and issuance rules. Enclave evidence is evaluated based on the authorization rules. Issuance rules define the claims to be included in attestation token. If claims in enclave evidence don't comply with authorization rules, attest calls will return policy evaluation error.
75
75
76
76
**Error code**
77
77
PolicyEvaluationError
78
78
79
79
**Scenario examples**
80
-
When claims in the enclave quote do not match with the authorization rules of attestation policy
80
+
When claims in the enclave quote don't match with the authorization rules of attestation policy
81
81
82
82
```
83
83
Native operation failed with 65518: G:\Az\security\Attestation\src\AttestationServices\Instance\NativePolicyWrapper\NativePolicyEngine.cpp(168)\(null)!00007FF801762308: (caller: 00007FF80143DCC8) Exception(0) 83FFFFEE Policy Evaluation Error has occurred Msg:[Policy Engine Exception: A Deny claim was issued, authorization failed.]
@@ -93,7 +93,7 @@ Send a request to attest API by providing policy text in “draftPolicyForAttest
93
93
94
94
See [attestation policy examples](./policy-examples.md)
95
95
96
-
### 2.2. Attestation failure due to invalid input
96
+
### Attestation failure due to invalid input
97
97
98
98
**Error code**
99
99
InvalidParameter
@@ -110,7 +110,7 @@ Microsoft Azure Attestation supports attestation of SGX quotes generated by Inte
110
110
111
111
Refer to [code samples](/samples/browse/?expanded=azure&terms=attestation) for performing attestation using Open Enclave SDK/ Intel SDK
112
112
113
-
### 2.3. Invalid certificate chain error while uploading policy/policy signer
113
+
### Invalid certificate chain error while uploading policy/policy signer
114
114
115
115
**Error code**
116
116
InvalidParameter
@@ -138,7 +138,7 @@ Else the certificate chain is considered to be invalid.
138
138
139
139
See [policy signer](./policy-signer-examples.md) and [policy](./policy-examples.md) examples
140
140
141
-
### 2.4. Add/Delete policy signer failure
141
+
### Add/Delete policy signer failure
142
142
143
143
**Error code**
144
144
InvalidOperation
@@ -186,7 +186,7 @@ At line:1 char:1
186
186
**Troubleshooting steps**
187
187
To add/delete a new policy signer certificate, use RFC7519 JSON Web Token (JWT) with a claim named "x-ms-policyCertificate". Value of the claim is an RFC7517 JSON Web Key, which contains the certificate to be added. JWT must be signed with private key of any of the valid policy signer certificates associated with the provider. See [policy signer examples](./policy-signer-examples.md).
188
188
189
-
### 2.5. Attestation policy configuration failure
189
+
### Attestation policy configuration failure
190
190
191
191
**Error code**
192
192
PolicyParsingError
@@ -238,9 +238,9 @@ In PowerShell, specify PolicyFormat as JWT to configure policy in JWT format. De
238
238
239
239
See attestation [policy examples](./policy-examples.md) and [how to author an attestation policy](./author-sign-policy.md)
240
240
241
-
## 3. Az.Attestation installation issues in PowerShell
241
+
## Az.Attestation installation issues in PowerShell
242
242
243
-
Unable to install Az Powershell or Az.Attestation PowerShell modules in PowerShell
243
+
Unable to install the Az PowerShell module or Az.Attestation PowerShell module in PowerShell.
244
244
245
245
### Error
246
246
@@ -257,29 +257,30 @@ To continue to interact with the PowerShell Gallery, run the following command b
## 4. Policy access/configuration issues in PowerShell
260
+
## Policy access/configuration issues in PowerShell
261
261
262
262
User assigned with appropriate roles. But facing authorization issues while managing attestation policies through PowerShell.
263
263
264
264
### Error
265
-
The client with object ID <object Id> does not have authorization to perform action Microsoft.Authorization/roleassignments/write over scope ‘subcriptions/<subscriptionId>resourcegroups/secure_enclave_poc/providers/Microsoft.Authorization/roleassignments/<role assignmentId>’ or the scope is invalid. If access was recently granted, please refresh your credentials
265
+
266
+
The client with object ID <object Id> does not have authorization to perform action Microsoft.Authorization/roleassignments/write over scope ‘subcriptions/<subscriptionId>resourcegroups/secure_enclave_poc/providers/Microsoft.Authorization/roleassignments/<role assignmentId>’ or the scope is invalid. If access was recently granted, refresh your credentials
266
267
267
268
### Troubleshooting steps
268
269
269
-
Minimum version of Az modules required to support attestation operations are the below:
270
+
The minimum version of the Az PowerShell modules required to support attestation operations are:
270
271
271
-
**Az 4.5.0**
272
-
273
-
**Az.Accounts 1.9.2**
274
-
275
-
**Az.Attestation 0.1.8**
272
+
-**Az 4.5.0**
273
+
-**Az.Accounts 1.9.2**
274
+
-**Az.Attestation 0.1.8**
276
275
277
276
Run the below command to verify the installed version of all Az modules
278
277
279
-
```powershell
278
+
```azurepowershell-interactive
280
279
Get-InstalledModule
281
280
```
282
281
283
-
If the versions are not matching with the minimum requirement, run Update-Module commands
282
+
If the versions do not meet the minimum requirement, run the Update-Module PowerShell cmdlet.
0 commit comments