You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
## Access the attestation provider from local machine ##
112
-
Enter `nslookup <provider-name>.attest.azure.net`. Replace **\<provider-name>** with the name of the attestation provider instance you created in the previous steps.
112
+
Enter `nslookup <provider-name>.attest.azure.net`. Replace `<provider-name>` with the name of the attestation provider instance you created in the previous steps.
113
113
```azurepowershell-interactive
114
114
## Access the attestation provider from local machine ##
@@ -189,7 +189,7 @@ In this section, you'll use the virtual machine you created in the previous step
189
189
190
190
8. Open Windows PowerShell on the server after you connect.
191
191
192
-
9. Enter `nslookup <provider-name>.attest.azure.net`. Replace **\<provider-name>** with the name of the attestation provider instance you created in the previous steps:
192
+
9. Enter `nslookup <provider-name>.attest.azure.net`. Replace `<provider-name>` with the name of the attestation provider instance you created in the previous steps:
193
193
194
194
```azurepowershell-interactive
195
195
## Access the attestation provider from local machine ##
Copy file name to clipboardExpand all lines: articles/attestation/quickstart-azure-cli.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -68,13 +68,13 @@ Here are commands you can use to create and manage the attestation provider:
68
68
1. Run the [az attestation create](/cli/azure/attestation#az-attestation-create) command to create an attestation provider without policy signing requirement:
69
69
70
70
```azurecli
71
-
az attestation create --name "myattestationprovider" --resource-group "MyResourceGroup" --location westus
71
+
az attestation create --name "<attestation-provider-name>" --resource-group "<resource-group>" --location westus
72
72
```
73
73
74
74
1. Run the [az attestation show](/cli/azure/attestation#az-attestation-show) command to retrieve attestation provider properties such as status and AttestURI:
75
75
76
76
```azurecli
77
-
az attestation show --name "myattestationprovider" --resource-group "MyResourceGroup"
77
+
az attestation show --name "<attestation-provider-name>" --resource-group "<resource-group>"
78
78
```
79
79
80
80
This command displays values like the following output:
@@ -94,7 +94,7 @@ Here are commands you can use to create and manage the attestation provider:
94
94
You can delete an attestation provider by using the [az attestation delete](/cli/azure/attestation#az-attestation-delete) command:
95
95
96
96
```azurecli
97
-
az attestation delete --name "myattestationprovider" --resource-group "sample-resource-group"
97
+
az attestation delete --name "<attestation-provider-name>" --resource-group "<resource-group>"
98
98
```
99
99
100
100
## Policy management
@@ -104,7 +104,7 @@ Use the commands described here to provide policy management for an attestation
104
104
The [az attestation policy show](/cli/azure/attestation/policy#az-attestation-policy-show) command returns the current policy for the specified TEE:
105
105
106
106
```azurecli
107
-
az attestation policy show --name "myattestationprovider" --resource-group "MyResourceGroup" --attestation-type SGX-IntelSDK
107
+
az attestation policy show --name "<attestation-provider-name>" --resource-group "<resource-group>" --attestation-type SGX-IntelSDK
108
108
```
109
109
110
110
> [!NOTE]
@@ -127,7 +127,7 @@ az attestation policy set --name testatt1 --resource-group testrg --attestation-
127
127
To set policy in JWT format for a given kind of attestation type using file path:
128
128
129
129
```azurecli
130
-
az attestation policy set --name "myattestationprovider" --resource-group "MyResourceGroup" \
130
+
az attestation policy set --name "<attestation-provider-name>" --resource-group "<resource-group>" \
Copy file name to clipboardExpand all lines: articles/cloud-hsm/backup-restore.md
+25-25Lines changed: 25 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to back up and restore your Azure Cloud HSM resources, in
4
4
author: msmbaldwin
5
5
ms.service: azure-cloud-hsm
6
6
ms.topic: tutorial
7
-
ms.date: 03/20/2025
7
+
ms.date: 03/26/2026
8
8
ms.author: mbaldwin
9
9
10
10
# Customer intent: As a security administrator, I need to back up and restore Azure Cloud HSM resources to ensure business continuity and facilitate disaster recovery.
@@ -49,10 +49,10 @@ Create a new user-assigned managed identity in your existing Azure Cloud HSM res
49
49
```azurepowershell-interactive
50
50
# Define parameters for the new managed identity
51
51
$identity = @{
52
-
Location = "<RegionName>"
53
-
ResourceName = "<ManagedIdentityName>"
54
-
ResourceGroupName = "<ResourceGroupName>"
55
-
SubscriptionID = "<SubscriptionID>"
52
+
Location = "<location>"
53
+
ResourceName = "<managed-identity-name>"
54
+
ResourceGroupName = "<resource-group>"
55
+
SubscriptionID = "<subscription-id>"
56
56
}
57
57
58
58
# Create a new user-assigned managed identity in the specified resource group and location
@@ -71,21 +71,21 @@ Each Cloud HSM cluster can have only one managed identity. You can use the same
71
71
```azurepowershell-interactive
72
72
# Define the parameters for the source Cloud HSM resource
@@ -118,7 +118,7 @@ The following attributes are applicable to X.509 public key certificates.
118
118
119
119
### C_DestroyObject
120
120
121
-
The C_DestroyObject API takes a session handle, and the object handle associated with the certificate you want to delete. Invoking this function removes the specified certificate from the Azure Blob Storage Account by deleting the corresponding JWS blob named pkcs11_certificate_<cert_handle>.
121
+
The C_DestroyObject API takes a session handle, and the object handle associated with the certificate you want to delete. Invoking this function removes the specified certificate from the Azure Blob Storage Account by deleting the corresponding JWS blob named `pkcs11_certificate_<cert-handle>`.
122
122
123
123
Below is a code snippet demonstrating how to call C_DestroyObject for certificates (the same approach applies to keys).
124
124
@@ -349,7 +349,7 @@ Azure Cloud HSM includes sample application code to help validate certificate st
349
349
350
350
### Verify certificates in storage
351
351
352
-
After a successful call to the C_CreateObject() API, the newly created certificate object will appear in your Azure Blob Storage account, as specified in the azcloudhsm_application.cfg file. The blob will be named using the format pkcs11_certificate_\<ObjectHandle\>, as shown below. Certificate objects are assigned object handles ranging from 0xFFF00000 to 0xFFFFFFFF (decimal range: 4,293,918,720 to 4,294,967,295), allowing support for up to 1,048,575 certificates.
352
+
After a successful call to the C_CreateObject() API, the newly created certificate object will appear in your Azure Blob Storage account, as specified in the azcloudhsm_application.cfg file. The blob will be named using the format `pkcs11_certificate_<object-handle>`, as shown below. Certificate objects are assigned object handles ranging from 0xFFF00000 to 0xFFFFFFFF (decimal range: 4,293,918,720 to 4,294,967,295), allowing support for up to 1,048,575 certificates.
353
353
354
354
From both Azure portal as well as from your Azure VM you can see the certificates stored.
Copy file name to clipboardExpand all lines: articles/cloud-hsm/quickstart-powershell.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: keithp
5
5
manager: keithp
6
6
ms.service: azure-cloud-hsm
7
7
ms.topic: quickstart
8
-
ms.date: 03/20/2025
8
+
ms.date: 03/26/2026
9
9
ms.author: keithp
10
10
11
11
#customer intent: As an IT pro decision-maker, I'm looking for key storage capability within the Azure cloud platform that meets FIPS 140-3 Level 3 certification and that gives me exclusive access to a dedicated hardware security module.
@@ -36,11 +36,11 @@ The following example code creates a resource group and a Cloud HSM instance. Yo
When you run the `New-AzResource` command with the `-AsJob` parameter, it creates a background job to deploy your Cloud HSM resource. You can check the status of the deployment by running:
129
129
130
130
```azurepowershell-interactive
131
-
Get-Job -Id <JobId> | Receive-Job
131
+
Get-Job -Id <job-id> | Receive-Job
132
132
```
133
133
134
-
In the preceding command, `<JobId>` is the ID that the system returned when you ran the `New-AzResource` command.
134
+
In the preceding command, `<job-id>` is the ID that the system returned when you ran the `New-AzResource` command.
135
135
136
136
The deployment is complete when you see a successful result from the job or when you can verify that the resource exists in your Azure subscription.
The PKCS#11 library knows how to find the client configuration because you must have a copy of your partition owner certificate (`PO.crt`) on the application server that's running your application and using the PKCS#11 library. In addition to the partition owner certificate:
186
186
187
-
- You have to update `/azcloudhsm_client/azcloudhsm_client.cfg` on the application server that has the SDK installed to point to your Azure Cloud HSM deployment (that is, `hsm1.chsm-<resourcename>-<uniquestring>.privatelink.cloudhsm.azure.net`).
187
+
- You have to update `/azcloudhsm_client/azcloudhsm_client.cfg` on the application server that has the SDK installed to point to your Azure Cloud HSM deployment (that is, `hsm1.chsm-<resource-name>-<unique-string>.privatelink.cloudhsm.azure.net`).
188
188
- The `azcloudhsm_client` tool must be running on the application server that connects to your Azure Cloud HSM deployment.
189
189
- You must specify a PIN within your PKCS#11 application by using the syntax `<username>:<password>`. This PIN is used for calling `C_Login` to your Azure Cloud HSM deployment.
190
190
- You must include `pkcs11_headers/include/cryptoki.h` and `pkcs11_headers/include/pkcs11t.h` in your PKCS#11 application to use the PKCS#11 library for Azure Cloud HSM.
@@ -193,7 +193,7 @@ The PKCS#11 library knows how to find the client configuration because you must
193
193
194
194
The `azcloudhsm_pkcs11.dll` file in the Azure Cloud HSM Windows SDK knows how to find the client configuration because you must have a copy of your partition owner certificate (`PO.crt`) on the application server that's running your application and using the PKCS#11 library. In addition to the partition owner certificate:
195
195
196
-
- You have to update `/azcloudhsm_client/azcloudhsm_client.cfg` on the application server that has the SDK installed to point to your Azure Cloud HSM deployment (that is, `hsm1.chsm-<resourcename>-<uniquestring>.privatelink.cloudhsm.azure.net`).
196
+
- You have to update `/azcloudhsm_client/azcloudhsm_client.cfg` on the application server that has the SDK installed to point to your Azure Cloud HSM deployment (that is, `hsm1.chsm-<resource-name>-<unique-string>.privatelink.cloudhsm.azure.net`).
197
197
- The `azcloudhsm_client` tool must run on the application server that connects to your Azure Cloud HSM deployment.
198
198
- You must specify a PIN within your PKCS#11 application by using the syntax `<username>:<password>`. This PIN is used for calling `C_Login` to your Azure Cloud HSM deployment.
199
199
- You must include `pkcs11_headers\include\cryptoki.h` and `pkcs11_headers\include\pkcs11t.h` in your PKCS#11 application to use the PKCS#11 library for Azure Cloud HSM.
0 commit comments