You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/attestation/quickstart-portal.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ Follow this quickstart to get started with Azure Attestation. Learn how to manag
16
16
17
17
## Prerequisites
18
18
19
-
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin. The user creating an attestation provider should have sufficient access levels on the subscription to create a resource (e.g: owner/contributor). Please refer [Azure built-in roles](../role-based-access-control/built-in-roles.md) for more information.
19
+
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin. The user creating an attestation provider should have sufficient access levels on the subscription to create a resource (e.g: owner/contributor). For more information, see [Azure built-in roles](../role-based-access-control/built-in-roles.md).
20
20
21
21
## Attestation provider
22
22
@@ -37,7 +37,7 @@ In this section, you'll create an attestation provider and configure it with eit
37
37
-**Policy signer certificates file**: Don't upload the policy signer certificates file to configure the provider with unsigned policies.
38
38
39
39
1. After you provide the required inputs, select **Review+Create**.
40
-
1.If there are validation issues, fix them and then select **Create**.
40
+
1.Fix any validation issuesand select **Create**.
41
41
42
42
### Create and configure the provider with signed policies
43
43
@@ -54,7 +54,7 @@ In this section, you'll create an attestation provider and configure it with eit
54
54
-**Policy signer certificates file**: Upload the policy signer certificates file to configure the attestation provider with signed policies. [See examples of policy signer certificates](./policy-signer-examples.md).
55
55
56
56
1. After you provide the required inputs, select **Review+Create**.
57
-
1.If there are validation issues, fix them and then select **Create**.
57
+
1.Fix any validation issuesand select **Create**.
58
58
59
59
### View the attestation provider
60
60
@@ -86,7 +86,7 @@ Follow the steps in this section to view, add, and delete policy signer certific
86
86
1. Go to the Azure portal menu or the home page and select **All resources**.
87
87
1. In the filter box, enter the attestation provider name.
88
88
1. Select the attestation provider and go to the overview page.
89
-
1. Select **Policy signer certificates** on the resource menu on the left side of the window or on the lower pane. If you see a prompt to select certificate for authentication, please click cancel to proceed.
89
+
1. Select **Policy signer certificates** on the resource menu on the left side of the window or on the lower pane. If you see a prompt to select certificate for authentication, select cancel to proceed.
90
90
1. Select **Download policy signer certificates**. The button will be disabled for attestation providers created without the policy signing requirement.
91
91
1. The downloaded text file will have all certificates in a JWS format.
92
92
1. Verify the certificate count and the downloaded certificates.
@@ -96,7 +96,7 @@ Follow the steps in this section to view, add, and delete policy signer certific
96
96
1. Go to the Azure portal menu or the home page and select **All resources**.
97
97
1. In the filter box, enter the attestation provider name.
98
98
1. Select the attestation provider and go to the overview page.
99
-
1. Select **Policy signer certificates** on the resource menu on the left side of the window or on the lower pane. If you see a prompt to select certificate for authentication, please click cancel to proceed.
99
+
1. Select **Policy signer certificates** on the resource menu on the left side of the window or on the lower pane. If you see a prompt to select certificate for authentication, select cancel to proceed.
100
100
1. Select **Add** on the upper menu. The button will be disabled for attestation providers created without the policy signing requirement.
101
101
1. Upload the policy signer certificate file and select **Add**. [See examples of policy signer certificates](./policy-signer-examples.md).
102
102
@@ -105,7 +105,7 @@ Follow the steps in this section to view, add, and delete policy signer certific
105
105
1. Go to the Azure portal menu or the home page and select **All resources**.
106
106
1. In the filter box, enter the attestation provider name.
107
107
1. Select the attestation provider and go to the overview page.
108
-
1. Select **Policy signer certificates** on the resource menu on the left side of the window or on the lower pane. If you see a prompt to select certificate for authentication, please click cancel to proceed.
108
+
1. Select **Policy signer certificates** on the resource menu on the left side of the window or on the lower pane. If you see a prompt to select certificate for authentication, Select **Cancel** to proceed.
109
109
1. Select **Delete** on the upper menu. The button will be disabled for attestation providers created without the policy signing requirement.
110
110
1. Upload the policy signer certificate file and select **Delete**. [See examples of policy signer certificates](./policy-signer-examples.md).
111
111
@@ -118,7 +118,7 @@ This section describes how to view an attestation policy and how to configure po
118
118
1. Go to the Azure portal menu or the home page and select **All resources**.
119
119
1. In the filter box, enter the attestation provider name.
120
120
1. Select the attestation provider and go to the overview page.
121
-
1. Select **Policy** on the resource menu on the left side of the window or on the lower pane. If you see a prompt to select certificate for authentication, please click cancel to proceed.
121
+
1. Select **Policy** on the resource menu on the left side of the window or on the lower pane. If you see a prompt to select certificate for authentication, select **Cancel** to proceed.
122
122
1. Select the preferred **Attestation Type** and view the **Current policy**.
123
123
124
124
### Configure an attestation policy
@@ -128,7 +128,7 @@ Follow these steps to upload a policy in JWT or text format if the attestation p
128
128
1. Go to the Azure portal menu or the home page and select **All resources**.
129
129
1. In the filter box, enter the attestation provider name.
130
130
1. Select the attestation provider and go to the overview page.
131
-
1. Select **Policy** on the resource menu on the left side of the window or on the lower pane. If you see a prompt to select certificate for authentication, please click cancel to proceed.
131
+
1. Select **Policy** on the resource menu on the left side of the window or on the lower pane. If you see a prompt to select certificate for authentication, select **Cancel** proceed.
132
132
1. Select **Configure** on the upper menu.
133
133
1. Select **Policy Format** as **JWT** or as **Text**.
Copy file name to clipboardExpand all lines: articles/attestation/quickstart-powershell.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: attestation
5
5
author: msmbaldwin
6
6
ms.service: attestation
7
7
ms.topic: overview
8
-
ms.date: 08/31/2020
8
+
ms.date: 01/23/2023
9
9
ms.author: mbaldwin
10
10
ms.custom: devx-track-azurepowershell
11
11
@@ -17,7 +17,7 @@ Follow the below steps to create and configure an attestation provider using Azu
17
17
18
18
> [!NOTE]
19
19
> Az.Attestation module is now integrated into Az PowerShell module. Minimum version of Az module required to support attestation operations:
20
-
- Az 6.5.0
20
+
- Az PowerShell 6.5.0
21
21
22
22
The PowerShell Gallery has deprecated Transport Layer Security (TLS) versions 1.0 and 1.1. TLS 1.2 or a later version is recommended. Hence you may receive the following errors:
Register the Microsoft.Attestation resource provider in subscription. For more information about Azure resource providers and how to configure and manage resources providers, see [Azure resource providers and types](../azure-resource-manager/management/resource-providers-and-types.md). Note that registering a resource provider is required only once for a subscription.
49
+
Register the Microsoft.Attestation resource provider in subscription. For more information about Azure resource providers and how to configure and manage resources providers, see [Azure resource providers and types](../azure-resource-manager/management/resource-providers-and-types.md). Registering a resource provider is required only once for a subscription.
Create a resource group for the attestation provider. Note that other Azure resources (including a virtual machine with client application instance) can be put in the same resource group.
62
+
Create a resource group for the attestation provider. Other Azure resources (including a virtual machine with client application instance) can be put in the same resource group.
63
63
64
64
```powershell
65
65
$location = "uksouth"
@@ -94,7 +94,7 @@ Get-AzAttestation retrieves the attestation provider properties like status and
To perform this action, an Azure AD user must have **Attestation Reader** role on the attestation provider. The read permission can be also be inherited with roles such as **Reader** (wildcard permissions) on the subscription/ resource group.
129
+
To perform this action, an Azure AD user must have **Attestation Reader** role on the attestation provider. The read permissions can be also be inherited with roles such as **Reader** (wildcard permissions) on the subscription/ resource group.
130
130
131
131
Below PowerShell cmdlets provide policy management for an attestation provider (one TEE at a time).
Policy signer certificate is a signed JWT with claim named "maa-policyCertificate". Value of the claim is a JWK which contains the trusted signing key to add. The JWT must be signed with private key corresponding to any of the existing policy signer certificates.
174
+
Policy signer certificate is a signed JWT with claim named "maa-policyCertificate". Value of the claim is a JWK, which contains the trusted signing key to add. The JWT must be signed with private key corresponding to any of the existing policy signer certificates.
175
175
176
176
Note that all semantic manipulation of the policy signer certificate must be done outside of PowerShell. As far as PowerShell is concerned, it is a simple string.
Copy file name to clipboardExpand all lines: articles/attestation/tpm-attestation-sample-policies.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.author: prsriva
12
12
---
13
13
# Examples of an attestation policy for TPM endpoint
14
14
15
-
Attestation policy is used to process the attestation evidence and determine whether Azure Attestation will issue an attestation token. Attestation token generation can be controlled with custom policies. Below are some examples of an attestation policy.
15
+
Attestation policy is used to process the attestation evidence and determine whether Azure Attestation will issue an attestation token. Attestation token generation can be controlled with custom policies.
Copy file name to clipboardExpand all lines: articles/attestation/troubleshoot-guide.md
+8-11Lines changed: 8 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,22 +5,19 @@ services: attestation
5
5
author: msmbaldwin
6
6
ms.service: attestation
7
7
ms.topic: reference
8
-
ms.date: 07/20/2020
8
+
ms.date: 01/23/2023
9
9
ms.author: mbaldwin
10
10
ms.custom: devx-track-azurepowershell
11
11
12
-
13
12
---
14
13
15
14
# Microsoft Azure Attestation troubleshooting guide
16
15
17
16
Error handling in Azure Attestation is implemented following [Microsoft REST API guidelines](https://github.com/microsoft/api-guidelines/blob/vNext/Guidelines.md#7102-error-condition-responses). The error response returned by Azure Attestation APIs contains HTTP status code and name/value pairs with the names “code” and “message”. The value of “code” is human-readable and is an indicator of the type of error. The value of “message” intends to aid the user and provides error details.
18
17
19
-
If your issue is not addressed in this article, you can also submit an Azure support request on the [Azure support page](https://azure.microsoft.com/support/options/).
20
-
21
-
Below are some examples of the errors returned by Azure Attestation:
18
+
If your issue isn't addressed in this article, you can also submit an Azure support request on the [Azure support page](https://azure.microsoft.com/support/options/).
22
19
23
-
## 1. HTTP–401: Unauthorized exception
20
+
## 1. HTTP–401: Unauthorized exception
24
21
25
22
### HTTP status code
26
23
401
@@ -29,8 +26,8 @@ Below are some examples of the errors returned by Azure Attestation:
29
26
Unauthorized
30
27
31
28
**Scenario examples**
32
-
- Unable to manage attestation policies as the user is not assigned with appropriate roles
33
-
- Unable to manage attestation policy signers as the user is not assigned with appropriate roles
29
+
- Unable to manage attestation policies as the user isn't assigned with appropriate roles
30
+
- Unable to manage attestation policy signers as the user isn't assigned with appropriate roles
34
31
35
32
User with Reader role trying to edit an attestation policy in PowerShell
36
33
@@ -50,7 +47,7 @@ In order to manage policies, an Azure AD user requires the following permissions
To perform these actions, an Azure AD user must have "Attestation Contributor" role on the attestation provider. These permissions can be also be inherited with roles such as "Owner" (wildcard permissions), "Contributor" (wildcard permissions) on the subscription/ resource group.
50
+
To perform these actions, an Azure AD user must have "Attestation Contributor" role on the attestation provider. These permissions can also be inherited with roles such as "Owner" (wildcard permissions), "Contributor" (wildcard permissions) on the subscription/ resource group.
54
51
55
52
In order to read policies, an Azure AD user requires the following permission for "Actions":
@@ -61,7 +58,7 @@ To verify the roles in PowerShell, run the below steps:
61
58
62
59
a. Launch PowerShell and log into Azure via the "Connect-AzAccount" cmdlet
63
60
64
-
b. Please refer the guidance [here](../role-based-access-control/role-assignments-list-powershell.md) to verify your Azure role assignment on the attestation provider
61
+
b. Refer to the guidance [here](../role-based-access-control/role-assignments-list-powershell.md) to verify your Azure role assignment on the attestation provider
65
62
66
63
c. If you don't find an appropriate role assignment, follow the instructions in [here](../role-based-access-control/role-assignments-powershell.md)
67
64
@@ -102,7 +99,7 @@ See [attestation policy examples](./policy-examples.md)
102
99
InvalidParameter
103
100
104
101
**Scenario examples**
105
-
SGX attestation failure due to invalid input. Below are some of the examples for error messages:
102
+
SGX attestation failure due to invalid input. Here are some examples of error messages:
106
103
- The specified quote was invalid due to an error in the quote collateral
107
104
- The specified quote was invalid because the device on which the quote was generated does not meet the Azure baseline requirements
108
105
- The specified quote was invalid because the TCBInfo or QEID provided by the PCK Cache Service was invalid
Copy file name to clipboardExpand all lines: articles/attestation/view-logs.md
+6-7Lines changed: 6 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,25 +5,24 @@ services: attestation
5
5
author: msmbaldwin
6
6
ms.service: attestation
7
7
ms.topic: reference
8
-
ms.date: 11/23/2020
8
+
ms.date: 01/23/2023
9
9
ms.author: mbaldwin
10
10
11
-
12
11
---
13
12
14
13
# Azure Attestation logging
15
14
16
-
If you create one or more Azure Attestation resources, you’ll want to monitor how and when your attestation instance is accessed, and by whom. You can do this by enabling logging for Microsoft Azure Attestation, which saves information in an Azure storage account you provide.
15
+
If you create one or more Azure Attestation resources, you’ll want to monitor how and when your attestation instance is accessed, and by whom. You can do so by enabling logging for Microsoft Azure Attestation, which saves information in an Azure storage account you provide.
17
16
18
-
Logging information will be available up to 10 minutes after the operation occurred (in most cases, it will be quicker than this). Since you provide the storage account, you can secure your logs via standard Azure access controls and delete logs you no longer want to keep in your storage account.
17
+
Logging information will be available up to 10 minutes after the operation occurred (in most cases, it will be quicker). Since you provide the storage account, you can secure your logs via standard Azure access controls and delete logs you no longer want to keep in your storage account.
19
18
20
19
## Interpret your Azure Attestation logs
21
20
22
21
When logging is enabled, up to three containers may be automatically created for you in your specified storage account: **insights-logs-auditevent, insights-logs-operational, insights-logs-notprocessed**. It is recommended to only use **insights-logs-operational** and **insights-logs-notprocessed**. **insights-logs-auditevent** was created to provide early access to logs for customers using VBS. Future enhancements to logging will occur in the **insights-logs-operational** and **insights-logs-notprocessed**.
23
22
24
23
**Insights-logs-operational** contains generic information across all TEE types.
25
24
26
-
**Insights-logs-notprocessed** contains requests which the service was unable to process, typically due to malformed HTTP headers, incomplete message bodies, or similar issues.
25
+
**Insights-logs-notprocessed** contains requests that the service was unable to process, typically due to malformed HTTP headers, incomplete message bodies, or similar issues.
27
26
28
27
Individual blobs are stored as text, formatted as a JSON blob. Let’s look at an example log entry:
29
28
@@ -72,11 +71,11 @@ Most of these fields are documented in the [Top-level common schema](../azure-mo
72
71
| traceContext | JSON blob representing the W3C trace-context |
73
72
| uri | Request URI |
74
73
75
-
The properties contain additional Azure attestation specific context:
74
+
The properties contain additional Azure attestation specific context:
| failureResourceId | Resource ID of component which resulted in request failure |
78
+
| failureResourceId | Resource ID of component that resulted in request failure |
80
79
| failureCategory | Broad category indicating category of a request failure. Includes categories such as AzureNetworkingPhysical, AzureAuthorization etc. |
81
80
| failureDetails | Detailed information about a request failure, if available |
82
81
| infoDataReceived | Information about the request received from the client. Includes some HTTP headers, the number of headers received, the content type and content length |
0 commit comments