Proposed Pull Request Change

title description services author ms.service ms.subservice ms.topic ms.date ms.author
Attestation for SGX enclaves You can use attestation to verify that your Azure confidential computing SGX enclave is secure. virtual-machines cynthn azure-virtual-machines azure-confidential-computing concept-article 12/20/2021 cynthn
📄 Document Links
GitHub View on GitHub Microsoft Learn View on Microsoft Learn
Raw New Markdown
Generating updated version of doc...
Rendered New Markdown
Generating updated version of doc...
+0 -0
+0 -0
--- title: Attestation for SGX enclaves description: You can use attestation to verify that your Azure confidential computing SGX enclave is secure. services: virtual-machines author: cynthn ms.service: azure-virtual-machines ms.subservice: azure-confidential-computing ms.topic: concept-article ms.date: 12/20/2021 ms.author: cynthn # Customer intent: As a developer, I want to implement attestation for my Intel SGX enclaves, so that I can ensure my applications run securely and maintain trust in the confidential computing environment. --- # Attestation for SGX Enclaves Azure confidential computing offers Intel SGX-based virtual machines (VMs) for isolating a portion of your code or data. When you [build with SGX enclaves](confidential-computing-enclaves.md), you can verify and validate that your trusted environment is secure. This verification is the process of attestation. ## Overview With attestation, a relying party can have increased confidence that their software runs in an enclave, is up-to-date, and is secure. For example, an enclave can ask the underlying hardware to generate a credential. This credential includes proof that the enclave exists on the platform. A second enclave can receive and verify that the same platform generated the report. :::image type="content" source="./media/attestation/attestation.png" alt-text="Diagram of attestation process, showing client's secure exchange with enclave that holds the data and application code."::: Implement attestation with a secure attestation service that is compatible with the system software and silicon. Two options are [Microsoft Azure Attestation](/azure/attestation/overview), and [Intel's attestation and provisioning services](https://software.intel.com/sgx/attestation-services).Both services are compatible with Intel SGX **DCsv2-series** VMs in Azure confidential computing. However, **DCsv3-series** and **DCdsv3-series** VMs aren't compatible with Intel attestation service. ## Next step > [!div class="nextstepaction"] > [Microsoft Azure Attestation samples for enclave aware apps](/samples/azure-samples/microsoft-azure-attestation/sample-code-for-intel-sgx-attestation-using-microsoft-azure-attestation/)
Success! Branch created successfully. Create Pull Request on GitHub
Error: