Skip to content

[TrustedLaunch] Default --enable-secure-boot and --enable-vtpm to true and optional flags in relation to --security-type TrustedLaunch #23144

@sf-76

Description

@sf-76

Related command
az vm create
az vmss create

Is your feature request related to a problem? Please describe.
Today if a customer does not provide the values for --enable-vtpm and --enable-secure-boot, the values are not defaulted to true. This will result in a VM that does not take advantage of the full features of Trusted Launch

Describe the solution you'd like
We would like to make EnableVtpm and EnableSecureBoot as optional flags in relation to SecurityType, and have the EnableVtpm and EnableSecureBoot flags set to true in the background. This will lower the bar of entry even further, provide the customer the full set of Trusted Launch features by default, as well as provide the Guest Attestation extension by default functionality.

Describe alternatives you've considered
n/a

Additional context
az vm create -n "s1win1" -g sirlinazsub_1 --location japaneast --size Standard_D2s_v3 --image MicrosoftWindowsServer:WindowsServer:2019-Datacenter-Gensecond:latest --admin-username "player1" --admin-password "supersecurepw" --security-type TrustedLaunch

az vmss create -n s1vmss1 -g sirlin5 --location westcentralus --instance-count 5 --data-disk-sizes-gb 2 --os-disk-size-gb 128 --image SUSE:SLES-15-SP2:GEN2:latest --admin-username "player1" --admin-password "supersecurepw" --security-type TrustedLaunch

Both scenarios listed above should result in secureboot enabled, vtpm enabled, and MSI enablement, and Guest Attestation extension installation.

Metadata

Metadata

Labels

Auto-AssignAuto assign by botAzure CLI TeamThe command of the issue is owned by Azure CLI teamComputeaz vm/vmss/image/disk/snapshotfeature-request

Type

No type

Projects

No projects

Relationships

None yet

Development

No branches or pull requests

Issue actions