Skip to content

Commit f3425e8

Browse files
Update articles/confidential-computing/guest-attestation-confidential-vms-design.md
Co-authored-by: Radhika Jandhyala <[email protected]>
1 parent 18712e1 commit f3425e8

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/confidential-computing/guest-attestation-confidential-vms-design.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Azure confidential VMs utilize a vTPM-based design for the guest attestation. Th
2222

2323
The guest attestation process involves two main steps: evidence generation and evidence verification. The Azure confidential VM generates vTPM evidence, which is then verified by a trusted party (e.g., [Microsoft Azure Attestation (MAA)](https://azure.microsoft.com/products/azure-attestation)).
2424

25-
A relaying party, such as [Azure Key Vault Premium](../security/fundamentals/key-management.md) or [Azure Key Vault Managed HSM](../key-vault/managed-hsm/overview.md), can assess the trustworthiness of the Azure confidential VM based on the verification results. If the VM is deemed trustworthy, the relying party can securely provision secrets to the VM, using mechanisms like [Secure Key Release](concept-skr-attestation.md).
25+
A relying party, such as [Azure Key Vault Premium](../security/fundamentals/key-management.md) or [Azure Key Vault Managed HSM](../key-vault/managed-hsm/overview.md), can assess the trustworthiness of the Azure confidential VM based on the verification results. If the VM is deemed trustworthy, the relying party can securely provision secrets to the VM, using mechanisms like [Secure Key Release](concept-skr-attestation.md).
2626

2727
### vTPM Evidence
2828

0 commit comments

Comments
 (0)