You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
## Access the attestation provider from local machine ##
112
-
Enter `nslookup <provider-name>.attest.azure.net`. Replace **\<provider-name>** with the name of the attestation provider instance you created in the previous steps.
112
+
Enter `nslookup <provider-name>.attest.azure.net`. Replace `<provider-name>` with the name of the attestation provider instance you created in the previous steps.
113
113
```azurepowershell-interactive
114
114
## Access the attestation provider from local machine ##
@@ -189,7 +189,7 @@ In this section, you'll use the virtual machine you created in the previous step
189
189
190
190
8. Open Windows PowerShell on the server after you connect.
191
191
192
-
9. Enter `nslookup <provider-name>.attest.azure.net`. Replace **\<provider-name>** with the name of the attestation provider instance you created in the previous steps:
192
+
9. Enter `nslookup <provider-name>.attest.azure.net`. Replace `<provider-name>` with the name of the attestation provider instance you created in the previous steps:
193
193
194
194
```azurepowershell-interactive
195
195
## Access the attestation provider from local machine ##
Copy file name to clipboardExpand all lines: articles/attestation/quickstart-azure-cli.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -68,13 +68,13 @@ Here are commands you can use to create and manage the attestation provider:
68
68
1. Run the [az attestation create](/cli/azure/attestation#az-attestation-create) command to create an attestation provider without policy signing requirement:
69
69
70
70
```azurecli
71
-
az attestation create --name "myattestationprovider" --resource-group "MyResourceGroup" --location westus
71
+
az attestation create --name "<attestation-provider-name>" --resource-group "<resource-group>" --location westus
72
72
```
73
73
74
74
1. Run the [az attestation show](/cli/azure/attestation#az-attestation-show) command to retrieve attestation provider properties such as status and AttestURI:
75
75
76
76
```azurecli
77
-
az attestation show --name "myattestationprovider" --resource-group "MyResourceGroup"
77
+
az attestation show --name "<attestation-provider-name>" --resource-group "<resource-group>"
78
78
```
79
79
80
80
This command displays values like the following output:
@@ -94,7 +94,7 @@ Here are commands you can use to create and manage the attestation provider:
94
94
You can delete an attestation provider by using the [az attestation delete](/cli/azure/attestation#az-attestation-delete) command:
95
95
96
96
```azurecli
97
-
az attestation delete --name "myattestationprovider" --resource-group "sample-resource-group"
97
+
az attestation delete --name "<attestation-provider-name>" --resource-group "<resource-group>"
98
98
```
99
99
100
100
## Policy management
@@ -104,7 +104,7 @@ Use the commands described here to provide policy management for an attestation
104
104
The [az attestation policy show](/cli/azure/attestation/policy#az-attestation-policy-show) command returns the current policy for the specified TEE:
105
105
106
106
```azurecli
107
-
az attestation policy show --name "myattestationprovider" --resource-group "MyResourceGroup" --attestation-type SGX-IntelSDK
107
+
az attestation policy show --name "<attestation-provider-name>" --resource-group "<resource-group>" --attestation-type SGX-IntelSDK
108
108
```
109
109
110
110
> [!NOTE]
@@ -127,7 +127,7 @@ az attestation policy set --name testatt1 --resource-group testrg --attestation-
127
127
To set policy in JWT format for a given kind of attestation type using file path:
128
128
129
129
```azurecli
130
-
az attestation policy set --name "myattestationprovider" --resource-group "MyResourceGroup" \
130
+
az attestation policy set --name "<attestation-provider-name>" --resource-group "<resource-group>" \
Copy file name to clipboardExpand all lines: articles/cloud-hsm/authentication.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Authentication in Azure Cloud HSM
3
3
description: Learn about various authentication methods and best practices for securing and optimizing your Azure Cloud HSM deployment.
4
4
author: msmbaldwin
5
5
ms.service: azure-cloud-hsm
6
-
ms.topic: conceptual
6
+
ms.topic: feature-guide
7
7
ms.date: 03/20/2025
8
8
ms.author: mbaldwin
9
9
#customer intent: As a Cloud HSM administrator, I want to learn how to secure and optimize my Cloud HSM deployment so that I can ensure the highest level of security and performance.
Copy file name to clipboardExpand all lines: articles/cloud-hsm/backup-restore.md
+26-26Lines changed: 26 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,8 +3,8 @@ title: Back Up and Restore Azure Cloud HSM Resources
3
3
description: Learn how to back up and restore your Azure Cloud HSM resources, including prerequisites, configuration steps, and validation procedures.
4
4
author: msmbaldwin
5
5
ms.service: azure-cloud-hsm
6
-
ms.topic: conceptual
7
-
ms.date: 03/20/2025
6
+
ms.topic: tutorial
7
+
ms.date: 03/26/2026
8
8
ms.author: mbaldwin
9
9
10
10
# Customer intent: As a security administrator, I need to back up and restore Azure Cloud HSM resources to ensure business continuity and facilitate disaster recovery.
@@ -49,10 +49,10 @@ Create a new user-assigned managed identity in your existing Azure Cloud HSM res
49
49
```azurepowershell-interactive
50
50
# Define parameters for the new managed identity
51
51
$identity = @{
52
-
Location = "<RegionName>"
53
-
ResourceName = "<ManagedIdentityName>"
54
-
ResourceGroupName = "<ResourceGroupName>"
55
-
SubscriptionID = "<SubscriptionID>"
52
+
Location = "<location>"
53
+
ResourceName = "<managed-identity-name>"
54
+
ResourceGroupName = "<resource-group>"
55
+
SubscriptionID = "<subscription-id>"
56
56
}
57
57
58
58
# Create a new user-assigned managed identity in the specified resource group and location
@@ -71,21 +71,21 @@ Each Cloud HSM cluster can have only one managed identity. You can use the same
71
71
```azurepowershell-interactive
72
72
# Define the parameters for the source Cloud HSM resource
Copy file name to clipboardExpand all lines: articles/cloud-hsm/key-management.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Comprehensive Guide to Key Management in Azure Cloud HSM
3
3
description: Learn best practices and recommendations for key management in Azure Cloud HSM, including storage limits, key wrapping security, and caching strategies.
description: Learn how to secure your network configuration for Azure Cloud HSM to prevent unauthorized access and enhance overall security.
4
4
author: msmbaldwin
5
5
ms.service: azure-cloud-hsm
6
-
ms.topic: conceptual
6
+
ms.topic: best-practice
7
7
ms.date: 03/20/2025
8
8
ms.author: mbaldwin
9
9
#customer intent: As a security administrator, I need to understand how to secure my network configuration for Azure Cloud HSM so that I can prevent unauthorized access and enhance overall security.
@@ -118,7 +118,7 @@ The following attributes are applicable to X.509 public key certificates.
118
118
119
119
### C_DestroyObject
120
120
121
-
The C_DestroyObject API takes a session handle, and the object handle associated with the certificate you want to delete. Invoking this function removes the specified certificate from the Azure Blob Storage Account by deleting the corresponding JWS blob named pkcs11_certificate_<cert_handle>.
121
+
The C_DestroyObject API takes a session handle, and the object handle associated with the certificate you want to delete. Invoking this function removes the specified certificate from the Azure Blob Storage Account by deleting the corresponding JWS blob named `pkcs11_certificate_<cert-handle>`.
122
122
123
123
Below is a code snippet demonstrating how to call C_DestroyObject for certificates (the same approach applies to keys).
124
124
@@ -349,7 +349,7 @@ Azure Cloud HSM includes sample application code to help validate certificate st
349
349
350
350
### Verify certificates in storage
351
351
352
-
After a successful call to the C_CreateObject() API, the newly created certificate object will appear in your Azure Blob Storage account, as specified in the azcloudhsm_application.cfg file. The blob will be named using the format pkcs11_certificate_\<ObjectHandle\>, as shown below. Certificate objects are assigned object handles ranging from 0xFFF00000 to 0xFFFFFFFF (decimal range: 4,293,918,720 to 4,294,967,295), allowing support for up to 1,048,575 certificates.
352
+
After a successful call to the C_CreateObject() API, the newly created certificate object will appear in your Azure Blob Storage account, as specified in the azcloudhsm_application.cfg file. The blob will be named using the format `pkcs11_certificate_<object-handle>`, as shown below. Certificate objects are assigned object handles ranging from 0xFFF00000 to 0xFFFFFFFF (decimal range: 4,293,918,720 to 4,294,967,295), allowing support for up to 1,048,575 certificates.
353
353
354
354
From both Azure portal as well as from your Azure VM you can see the certificates stored.
Copy file name to clipboardExpand all lines: articles/cloud-hsm/quickstart-powershell.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: keithp
5
5
manager: keithp
6
6
ms.service: azure-cloud-hsm
7
7
ms.topic: quickstart
8
-
ms.date: 03/20/2025
8
+
ms.date: 03/26/2026
9
9
ms.author: keithp
10
10
11
11
#customer intent: As an IT pro decision-maker, I'm looking for key storage capability within the Azure cloud platform that meets FIPS 140-3 Level 3 certification and that gives me exclusive access to a dedicated hardware security module.
@@ -36,11 +36,11 @@ The following example code creates a resource group and a Cloud HSM instance. Yo
When you run the `New-AzResource` command with the `-AsJob` parameter, it creates a background job to deploy your Cloud HSM resource. You can check the status of the deployment by running:
129
129
130
130
```azurepowershell-interactive
131
-
Get-Job -Id <JobId> | Receive-Job
131
+
Get-Job -Id <job-id> | Receive-Job
132
132
```
133
133
134
-
In the preceding command, `<JobId>` is the ID that the system returned when you ran the `New-AzResource` command.
134
+
In the preceding command, `<job-id>` is the ID that the system returned when you ran the `New-AzResource` command.
135
135
136
136
The deployment is complete when you see a successful result from the job or when you can verify that the resource exists in your Azure subscription.
0 commit comments