1.0 Introduction
Fortanix Confidential Computing Manager (CCM) enables an application to run in a confidential environment. The solution orchestrates critical security policies such as identity verification, data access control, and code attestation for enclaves that are required for confidential computing.
This quickstart guide will help you get started with Fortanix CCM. It also contains the information related to:
Signing up and logging in to Fortanix CCM
Creating and selecting an account
Creating and assigning a group
Adding an application
Creating an image of the application
Domain and image approval
Enroll compute node agent
Running the application
For a detailed user guide, refer to User's Guide: Using Applications and Datasets.
1.2 Prerequisites: Getting Started Video
A private Docker registry to push converted application image(s).
An Azure Portal subscription account.
2.0 Fortanix CCM Workflow
2.1 Signup and Log in to Fortanix CCM
Visit https://ccm.fortanix.com and sign up.
After your account is approved by the Administrator, log in by entering your email address and password.
Figure 1: Logging In
2.2 Create and Select an Account
Once you log in to your account, you will be taken to the Accounts page. Click ADD ACCOUNT to create a new account.
Enter a name for the new account and optionally add a custom logo for the account.
To allow compute nodes to bypass Intel's IAS attestation and successfully enroll regardless of attestation failing, click the check box “This is a test-only deployment”. For more details about Attestation Bypass refer to the user guide Disable Fortanix CCM Attestation.
Click CREATE ACCOUNT to complete the account creation.
Figure 2: Create an Account
Once the account is created, click SELECT ACCOUNT to select the newly created account and start enrolling compute nodes and creating applications.
Figure 3: Select an Account
2.3 Add a Group
Navigate to Groups from the menu list and click + ADD GROUP to add a group.
Figure 4: Add Group Button
Click the ADD GROUP button to create a new group.
Enter the required Name for the group and add Labels with Key:Value pairs.
Click the CREATE GROUP button.
The group is successfully created.
2.4 Add an Application - Example: Flask Server
Navigate to the Applications menu item from the CCM UI left navigation bar and click + ADD APPLICATION to add an application. In this example, we will add an Enclave OS application running a Python Flask server.
Figure 5: Create an Application
Click the ADD button for the Enclave OS Application.
NOTE
This quickstart guide covers adding an Enclave OS application.
Refer to the following link for EDP applications: EDP applications on CCM.
Refer to the following link for ACI applications: ACI applications on CCM.
Figure 6: Add an Enclave OS Application
Fill in the relevant details as shown below and click NEXT. You can use Fortanix's public docker registry for the sample app.
Details:
Docker Hub: https://hub.docker.com/u/fortanix
Optional: You can run the app with the following command:sudo docker run fortanix/python-flask
NOTE
It is recommended to use your private docker registry to store the output image.
Figure 7: Configure an Application
For more details on how to configure an Enclave OS application, refer to Adding an Enclave OS Application.
2.5 Create an Image
A Fortanix CCM Image is a particular software release or a version of an application. Each image is associated with one enclave hash (MRENCLAVE).
Once you create an Enclave OS application and click the NEXT button, you will see the Add image page where you must configure the image of the Enclave OS application. Click the + IMAGE button to create an image.
Figure 8: Create an Image
For the Tag field, use “
latest
” if you want to use the latest image builds.Enter the REGISTRY CREDENTIALS for the Output image name. Here, the registry credentials are the credentials needed to access the private docker registry where the image will be pushed. Since the input image is stored in a public registry, there is no need to provide credentials for the input image.
If you have added these registry credentials in the Settings page of Fortanix CCM, then the check box Use saved credentials will be selected by default and the registry name will be filled automatically for the Add Registry Credentials fields.
Figure 9: Add Saved Registry Credentials
If you have not saved any Registry Credentials in the Settings page, then manually enter the registry credentials for the Output image name.
Figure 10: Add Registry Credentials Manually
Click CREATE to proceed (Figure 9).
If you selected the Image Type as Intel SGX, enter the following details:
ISVPRODID is a numeric product identifier. A user must choose a unique value in the range of 0-65535 for their applications.
ISVSVN is a numeric security version to be assigned to the Enclave. This number should be incremented if security relevant change is made to the application.
Memory size – Choose the memory size from the drop-down to change the memory size of the enclave.
Thread count – Change the thread count to support the application.
If you selected the Image Type as AWS Nitro, enter the following details:Memory size
CPU count – CPU count is the number of CPUs to dedicate to an enclave out of all the CPUs available to the host machine.
On successful completion of the image creation, you will see a notification that the image was successfully created and your application will be listed in the Applications screen.
For more details refer to the URLs below:
To add multiple image registries: User's Guide - Image Registry
To create an EOS application image: User's Guide - Create an Image for Enclave OS Applications
To create an EDP application image: User's Guide - Create an Image for EDP Applications
To create an ACI application image: User's Guide - Create an Image for ACI Applications
2.6 Application Image Approval
On the Tasks screen, click on the "Build Whitelist for app: Python Application Server" task.
Click APPROVE to whitelist the image created in the step above.
Figure 11: Approve the Application Image
Figure 12: Approve the Application Image
2.7 Enroll Compute Node Agent - SGX
Click the Infrastructure → Compute Nodes menu item from the CCM left navigation bar and click the + ENROLL NODE button.
Click COPY to copy the Join Token. This Join Token is used by the compute node to authenticate itself.
Figure 13: Copy the Generated Join Token
Visit https://azuremarketplace.microsoft.com/en-us/marketplace/apps/fortanix.rte_node_agent to create the Node Agent VM to register the compute node.
NOTE
Alternatively, you can also download the latest node agent software from Fortanix Node Agent and install it on your own machine.
Figure 14: Create Node Agent in Azure
Fill in the information as given below to spin up the node agent on Azure. Paste the Token generated earlier on the "Join Token" field on the Azure portal.
NOTE
Information about the available regions and the supported VMs can be found here.
Figure 15: Configure the Node Agent
Figure 16: Configuring the Node Agent
After the node agent is created, the compute node will be enrolled in Fortanix CCM, and you will see it under the Compute Nodes overview table.
Figure 17: Node Enrolled
For more details on how to enroll compute nodes, refer to CCM Compute Nodes.
2.8 Enroll Compute Node Agent - AWS Nitro
For details to set up the environment, refer to User's Guide: Setting up the Environment.
Obtain the join token from Fortanix CCM. To generate your Join Token, please log in to https://ccm.fortanix.com/. On the Infrastructure page, click +ENROLL NODE on the Compute Nodes page.
Figure 18: Enroll Compute Node
In the ENROLL NODE window, a Join Token will be generated in the text box for "Get a join token to register an SGX compute node". This Join Token is used by the compute node to authenticate itself.
Figure 19: Copy Join Token
Click Copy to copy the Join Token (Figure 17).
Download the Amazon Nitro node agent installer.
Extract the contents of the package and open the folder.
Open the readme file which contains the steps to enroll the compute node in Fortanix CCM.
To enroll the compute node:
Copy the file
installer.sh
to your VM.Run the
installer.sh
with the join token copied in Step 3 . This will enroll the compute node in Fortanix CCM.sudo bash ./installer.sh
Once the compute node is enrolled in Fortanix CCM, you will see it under the Compute Nodes overview table.
Figure 20: Node Enrolled
2.9 Run the Application Image on the Enrolled Compute Node
Install docker on the enrolled compute node. To install docker, use the command:
sudo apt install docker.io
Finally, run this application image on the node by using the following command:
For this example application, for SGX Platform, the command would be:sudo docker run --privileged --volume /dev:/dev -v /var/run/aesmd/aesm.socket:/var/run/aesmd/aesm.socket -e NODE_AGENT_BASE_URL=http://52.152.206.164:9092/v1/ fortanix-private/python-flask-sgx
Where,
9092
is the default port on which Node Agent listens to.52.152.206.164
is the node agent Host IP.fortanix-private/python-flask-sgx
is the converted app that can be found in the Images under the Image Name column in the Images table.
Figure 21: Run the Application
For AWS Nitro Platform, the command would be:
sudo docker run -it --rm --privileged -v /run/nitro_enclaves:/run/nitro_enclaves -e RUST_LOG=debug -e NODE_AGENT_BASE_URL=http://172.31.14.110:9092/v1/ -p 80:80 -p 443:443 513076507034.dkr.ecr.us-west-1.amazonaws.com/development-images/em-test-framework-nginx-9913:nitro
Where,
9092
is the default port on which Node Agent listens to.172.31.14.110
is the node agent Host IP.em-test-framework-nginx-9913:nitro
is the converted app that can be found in the Images under the Image Name column in the Images table.
NOTE
Please use your own inputs for Node IP, Port (if you changed it), and Converted Image in the above format. The information in the example above is just a sample.
3.0 Where to go from here
Congratulations, you have just deployed your first confidential computing application using the Fortanix Confidential Computing Manager! To explore more features of Fortanix CCM please visit one of the following guides:
Provision a TLS certificate using CCM: Certificate Configuration
Use identity and policy management on applications and compute nodes
Build and deploy confidential computing applications in Rust using the Fortanix EDP platform: EDP applications on CCM.
For quick support, please join our Slack community: https://fortanix.com/community Channel: #enclavemanager