You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
## Access the attestation provider from local machine ##
112
-
Enter `nslookup <provider-name>.attest.azure.net`. Replace **\<provider-name>** with the name of the attestation provider instance you created in the previous steps.
112
+
Enter `nslookup <provider-name>.attest.azure.net`. Replace `<provider-name>` with the name of the attestation provider instance you created in the previous steps.
113
113
```azurepowershell-interactive
114
114
## Access the attestation provider from local machine ##
@@ -189,7 +189,7 @@ In this section, you'll use the virtual machine you created in the previous step
189
189
190
190
8. Open Windows PowerShell on the server after you connect.
191
191
192
-
9. Enter `nslookup <provider-name>.attest.azure.net`. Replace **\<provider-name>** with the name of the attestation provider instance you created in the previous steps:
192
+
9. Enter `nslookup <provider-name>.attest.azure.net`. Replace `<provider-name>` with the name of the attestation provider instance you created in the previous steps:
193
193
194
194
```azurepowershell-interactive
195
195
## Access the attestation provider from local machine ##
Copy file name to clipboardExpand all lines: articles/attestation/quickstart-azure-cli.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -68,13 +68,13 @@ Here are commands you can use to create and manage the attestation provider:
68
68
1. Run the [az attestation create](/cli/azure/attestation#az-attestation-create) command to create an attestation provider without policy signing requirement:
69
69
70
70
```azurecli
71
-
az attestation create --name "myattestationprovider" --resource-group "MyResourceGroup" --location westus
71
+
az attestation create --name "<attestation-provider-name>" --resource-group "<resource-group>" --location westus
72
72
```
73
73
74
74
1. Run the [az attestation show](/cli/azure/attestation#az-attestation-show) command to retrieve attestation provider properties such as status and AttestURI:
75
75
76
76
```azurecli
77
-
az attestation show --name "myattestationprovider" --resource-group "MyResourceGroup"
77
+
az attestation show --name "<attestation-provider-name>" --resource-group "<resource-group>"
78
78
```
79
79
80
80
This command displays values like the following output:
@@ -94,7 +94,7 @@ Here are commands you can use to create and manage the attestation provider:
94
94
You can delete an attestation provider by using the [az attestation delete](/cli/azure/attestation#az-attestation-delete) command:
95
95
96
96
```azurecli
97
-
az attestation delete --name "myattestationprovider" --resource-group "sample-resource-group"
97
+
az attestation delete --name "<attestation-provider-name>" --resource-group "<resource-group>"
98
98
```
99
99
100
100
## Policy management
@@ -104,7 +104,7 @@ Use the commands described here to provide policy management for an attestation
104
104
The [az attestation policy show](/cli/azure/attestation/policy#az-attestation-policy-show) command returns the current policy for the specified TEE:
105
105
106
106
```azurecli
107
-
az attestation policy show --name "myattestationprovider" --resource-group "MyResourceGroup" --attestation-type SGX-IntelSDK
107
+
az attestation policy show --name "<attestation-provider-name>" --resource-group "<resource-group>" --attestation-type SGX-IntelSDK
108
108
```
109
109
110
110
> [!NOTE]
@@ -127,7 +127,7 @@ az attestation policy set --name testatt1 --resource-group testrg --attestation-
127
127
To set policy in JWT format for a given kind of attestation type using file path:
128
128
129
129
```azurecli
130
-
az attestation policy set --name "myattestationprovider" --resource-group "MyResourceGroup" \
130
+
az attestation policy set --name "<attestation-provider-name>" --resource-group "<resource-group>" \
Copy file name to clipboardExpand all lines: articles/confidential-ledger/includes/confidential-ledger-rg-create.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,15 +7,15 @@ ms.author: msmbaldwin
7
7
8
8
---
9
9
10
-
A resource group is a logical container into which Azure resources are deployed and managed. Use the Azure CLI [az group create](/cli/azure/group#az-group-create) command or the Azure PowerShell [New-AzResourceGroup](/powershell/module/az.resources/new-azresourcegroup) cmdlet to create a resource group named *myResourceGroup*in the *eastus* location.
10
+
A resource group is a logical container into which Azure resources are deployed and managed. Use the Azure CLI [az group create](/cli/azure/group#az-group-create) command or the Azure PowerShell [New-AzResourceGroup](/powershell/module/az.resources/new-azresourcegroup) cmdlet to create a resource group in your desired location.
11
11
12
12
# [Azure CLI](#tab/azure-cli)
13
13
```azurecli
14
-
az group create --name "myResourceGroup" -l "EastUS"
14
+
az group create --name "<resource-group>" -l "EastUS"
Copy file name to clipboardExpand all lines: articles/confidential-ledger/quickstart-cli.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ Your result is in the format `xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx`.
40
40
Use the Azure CLI [az confidentialledger create](/cli/azure/confidentialledger#az-confidentialledger-create) command to create a confidential ledger in your new resource group.
A successful operation returns the properties of the newly created ledger. Take note of the **ledgerUri**. In our example, this URI is "https://myledger.confidential-ledger.azure.com".
@@ -52,7 +52,7 @@ You need this URI to transact with the confidential ledger from the data plane.
52
52
You can view the properties associated with your newly created confidential ledger using the Azure CLI [az confidentialledger show](/cli/azure/confidentialledger#az-confidentialledger-show) command.
53
53
54
54
```azurecli
55
-
az confidentialledger show --name "myLedger" --resource-group "myResourceGroup"
55
+
az confidentialledger show --name "<ledger-name>" --resource-group "<resource-group>"
56
56
```
57
57
58
58
The returned JSON object displays the ledger's properties, including your role:
@@ -64,7 +64,7 @@ The returned JSON object displays the ledger's properties, including your role:
64
64
To update the properties of a confidential ledger, use do so, use the Azure CLI [az confidentialledger update](/cli/azure/confidentialledger#az-confidentialledger-update) command. For instance, to update your ledger to change your role to "Reader", run:
Copy file name to clipboardExpand all lines: articles/confidential-ledger/quickstart-net.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -82,7 +82,7 @@ using Azure.Security.ConfidentialLedger.Certificate;
82
82
83
83
### Authenticate and create a client
84
84
85
-
In this quickstart, logged in user is used to authenticate to Azure confidential ledger, which is preferred method for local development. The name of your confidential ledger is expanded to the key vault URI, in the format "https://\<your-confidential-ledger-name\>.confidential-ledger.azure.com". This example is using ['DefaultAzureCredential()'](/dotnet/api/azure.identity.defaultazurecredential) class from [Azure Identity Library](/dotnet/api/overview/azure/identity-readme), which allows to use the same code across different environments with different options to provide identity.
85
+
In this quickstart, logged in user is used to authenticate to Azure confidential ledger, which is preferred method for local development. The name of your confidential ledger is expanded to the key vault URI, in the format `https://<ledger-name>.confidential-ledger.azure.com`. This example is using ['DefaultAzureCredential()'](/dotnet/api/azure.identity.defaultazurecredential) class from [Azure Identity Library](/dotnet/api/overview/azure/identity-readme), which allows to use the same code across different environments with different options to provide identity.
86
86
87
87
```csharp
88
88
credential=DefaultAzureCredential()
@@ -151,7 +151,7 @@ namespace acl_app
151
151
152
152
// Replace with the name of your confidential ledger
Copy file name to clipboardExpand all lines: articles/confidential-ledger/quickstart-powershell.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,8 +42,7 @@ Your result is listed under "Id", in the format `xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxx
42
42
Use the Azure PowerShell [New-AzConfidentialLedger](/powershell/module/az.confidentialledger/new-azconfidentialledger) command to create a confidential ledger in your new resource group.
A successful operation returns the properties of the newly created ledger. Take note of the **ledgerUri**. In the example above, this URI is "https://myledger.confidential-ledger.azure.com".
@@ -55,13 +54,13 @@ You need this URI to transact with the confidential ledger from the data plane.
55
54
You can view the properties associated with your newly created confidential ledger using the Azure PowerShell [Get-AzConfidentialLedger](/powershell/module/az.confidentialledger/get-azconfidentialledger) cmdlet.
To update the properties of a confidential ledger, use do so, use the Azure PowerShell [Update-AzConfidentialLedger](/powershell/module/az.confidentialledger/update-azconfidentialledger) cmdlet. For instance, to update your ledger to change your role to "Reader", run:
Copy file name to clipboardExpand all lines: articles/confidential-ledger/quickstart-python.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -92,15 +92,15 @@ Next, use the [DefaultAzureCredential Class](/python/api/azure-identity/azure.id
92
92
credential = DefaultAzureCredential()
93
93
```
94
94
95
-
Finish setup by setting some variables for use in your application: the resource group (myResourceGroup), the name of ledger you want to create, and two urls to be used by the data plane client library.
95
+
Finish setup by setting some variables for use in your application: the resource group, the name of ledger you want to create, and two urls to be used by the data plane client library.
96
96
97
97
> [!Important]
98
-
> Each ledger must have a globally unique name. Replace \<your-unique-ledger-name\> with the name of your ledger in the following example.
98
+
> Each ledger must have a globally unique name. Replace `<ledger-name>` with the name of your ledger in the following example.
@@ -329,7 +329,7 @@ Other Azure confidential ledger articles can build upon this quickstart. If you
329
329
Otherwise, when you're finished with the resources created in this article, use the Azure CLI [az group delete](/cli/azure/group?#az-group-delete) command to delete the resource group and all its contained resources:
0 commit comments