{"id":"3f0b129b-234d-4e47-814c-ca2208bd270f","shortId":"kVhfGa","kind":"skill","title":"azure-confidential-computing","tagline":"Expert knowledge for Azure Confidential Computing development including troubleshooting, best practices, decision making, architecture & design patterns, limits & quotas, security, configuration, integrations & coding patterns, and deployment. Use when using SGX/SEV-SNP VMs, AKS ","description":"# Azure Confidential Computing Skill\n\nThis skill provides expert guidance for Azure Confidential Computing. Covers troubleshooting, best practices, decision making, architecture & design patterns, limits & quotas, security, configuration, integrations & coding patterns, and deployment. It combines local quick-reference content with remote documentation fetching capabilities.\n\n## How to Use This Skill\n\n> **IMPORTANT for Agent**: Use the **Category Index** below to locate relevant sections. For categories with line ranges (e.g., `L35-L120`), use `read_file` with the specified lines. For categories with file links (e.g., `[security.md](security.md)`), use `read_file` on the linked reference file\n\n> **IMPORTANT for Agent**: If `metadata.generated_at` is more than 3 months old, suggest the user pull the latest version from the repository. If `mcp_microsoftdocs` tools are not available, suggest the user install it: [Installation Guide](https://github.com/MicrosoftDocs/mcp/blob/main/README.md)\n\nThis skill requires **network access** to fetch documentation content:\n- **Preferred**: Use `mcp_microsoftdocs:microsoft_docs_fetch` with query string `from=learn-agent-skill`. Returns Markdown.\n- **Fallback**: Use `fetch_webpage` with query string `from=learn-agent-skill&accept=text/markdown`. Returns Markdown.\n\n## Category Index\n\n| Category | Lines | Description |\n|----------|-------|-------------|\n| Troubleshooting | L37-L41 | Troubleshooting AKS confidential node issues: common errors, limitations, configuration and deployment problems, and FAQs about setup, security, and workload compatibility. |\n| Best Practices | L42-L46 | FAQ and guidance on using Azure confidential VMs: supported scenarios, security guarantees, limitations, performance, pricing, and operational best practices. |\n| Decision Making | L47-L59 | Guidance on choosing Azure confidential computing options: VMs (AMD/Intel), containers, GPUs, deployment models, capabilities, products, and use cases for secure workloads. |\n| Architecture & Design Patterns | L60-L69 | Architectural patterns and design guidance for using Azure confidential VMs, SGX enclaves, AKS, and multi-party analytics to build secure AI and containerized workloads. |\n| Limits & Quotas | L70-L74 | Guidance on choosing sizes, quotas, and deployment limits for Intel SGX-enabled VMs in Azure, including capacity planning and scaling considerations. |\n| Security | L75-L90 | Attestation, vTPM, key/secrets handling, and hardening guidance to securely run and monitor Azure confidential VMs, SGX enclaves, AKS confidential containers, and clean rooms. |\n| Configuration | L91-L100 | Configuring Azure confidential VMs and AKS: SGX/device plugins, confidential containers, VMMD blob opt-out, key rotation, secure key release policies, and Virtual Machine Metablob Disk. |\n| Integrations & Coding Patterns | L101-L111 | Coding patterns and samples for building, running, and attesting Intel SGX/AMD SEV-SNP confidential apps and containers, including SKR flows, tools, and Fortanix/Key Vault integrations. |\n| Deployment | L112-L122 | How to deploy and migrate Azure confidential VMs/VMSS and AKS (SGX and confidential node pools), create custom images, and set up Fortanix CCM using CLI and ARM templates. |\n\n### Troubleshooting\n| Topic | URL |\n|-------|-----|\n| FAQ for AKS confidential computing nodes | https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-nodes-aks-faq |\n\n### Best Practices\n| Topic | URL |\n|-------|-----|\n| Azure confidential VM FAQ and usage guidance | https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-vm-faq |\n\n### Decision Making\n| Topic | URL |\n|-------|-----|\n| Select Azure confidential container offerings | https://learn.microsoft.com/en-us/azure/confidential-computing/choose-confidential-containers-offerings |\n| Choose Azure confidential computing deployment models | https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-computing-deployment-models |\n| Understand Azure confidential container options | https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-containers |\n| Overview of confidential containers on Azure | https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-containers |\n| Understand and choose Azure confidential VM capabilities | https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-vm-overview |\n| Use Azure confidential GPUs for secure compute offload | https://learn.microsoft.com/en-us/azure/confidential-computing/gpu-options |\n| Select Azure confidential computing products | https://learn.microsoft.com/en-us/azure/confidential-computing/overview-azure-products |\n| Choose Azure confidential computing use cases | https://learn.microsoft.com/en-us/azure/confidential-computing/use-cases-scenarios |\n| Select Azure confidential VM options on AMD or Intel | https://learn.microsoft.com/en-us/azure/confidential-computing/virtual-machine-options |\n\n### Architecture & Design Patterns\n| Topic | URL |\n|-------|-----|\n| Apply confidential computing to AI workloads on Azure | https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-ai |\n| Design solutions with Azure confidential computing options | https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-computing-solutions |\n| Use SGX enclave nodes in AKS workloads | https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-nodes-aks-overview |\n| Design enclave-aware container applications on AKS | https://learn.microsoft.com/en-us/azure/confidential-computing/enclave-aware-containers |\n| Understand Azure confidential VM guest attestation design | https://learn.microsoft.com/en-us/azure/confidential-computing/guest-attestation-confidential-virtual-machines-design |\n| Architect multi-party analytics on Azure confidential computing | https://learn.microsoft.com/en-us/azure/confidential-computing/multi-party-data |\n\n### Limits & Quotas\n| Topic | URL |\n|-------|-----|\n| Deploy and size Intel SGX VMs on Azure | https://learn.microsoft.com/en-us/azure/confidential-computing/virtual-machine-solutions-sgx |\n\n### Security\n| Topic | URL |\n|-------|-----|\n| Configure attestation for Azure SGX enclaves | https://learn.microsoft.com/en-us/azure/confidential-computing/attestation |\n| Use attestation types for Azure confidential workloads | https://learn.microsoft.com/en-us/azure/confidential-computing/attestation-solutions |\n| Use Secure Key Release with Azure Key Vault and confidential computing | https://learn.microsoft.com/en-us/azure/confidential-computing/concept-skr-attestation |\n| Use Azure Confidential Clean Rooms for secure collaboration | https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-clean-rooms |\n| Security model for AKS Confidential Containers | https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-containers-aks-security-policy |\n| Configure guest attestation for Azure confidential VMs | https://learn.microsoft.com/en-us/azure/confidential-computing/guest-attestation-confidential-vms |\n| Secure confidential VMs with Defender for Cloud and guest attestation | https://learn.microsoft.com/en-us/azure/confidential-computing/guest-attestation-defender-for-cloud |\n| Harden Linux images by removing Azure guest agent | https://learn.microsoft.com/en-us/azure/confidential-computing/harden-a-linux-image-to-remove-azure-guest-agent |\n| Harden Linux images by removing sudo users for confidential VMs | https://learn.microsoft.com/en-us/azure/confidential-computing/harden-the-linux-image-to-remove-sudo-users |\n| Leverage vTPM features in Linux confidential VMs | https://learn.microsoft.com/en-us/azure/confidential-computing/how-to-leverage-virtual-tpms-in-azure-confidential-vms |\n| Manage secrets and keys in Azure confidential computing | https://learn.microsoft.com/en-us/azure/confidential-computing/secret-key-management |\n| Use virtual TPMs in Azure confidential VMs securely | https://learn.microsoft.com/en-us/azure/confidential-computing/virtual-tpms-in-azure-confidential-vm |\n\n### Configuration\n| Topic | URL |\n|-------|-----|\n| Configure Confidential Containers on AKS (preview) | https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-containers-on-aks-preview |\n| Configure AKS Intel SGX device plugin (confcom) | https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-nodes-aks-addon |\n| Configure opt-out of VMMD blob for Azure Confidential VMs | https://learn.microsoft.com/en-us/azure/confidential-computing/disable-confidential-vm-metadata-blob |\n| Rotate customer-managed keys for Azure confidential VMs | https://learn.microsoft.com/en-us/azure/confidential-computing/key-rotation-offline |\n| Author Secure Key Release policies for Azure confidential TEEs | https://learn.microsoft.com/en-us/azure/confidential-computing/skr-policy-examples |\n| Use Virtual Machine Metablob Disk with confidential VMs | https://learn.microsoft.com/en-us/azure/confidential-computing/virtual-machine-metablob-disk |\n\n### Integrations & Coding Patterns\n| Topic | URL |\n|-------|-----|\n| Use development tools for Intel SGX enclaves on Azure | https://learn.microsoft.com/en-us/azure/confidential-computing/application-development |\n| Run confidential containers with Intel SGX enclaves | https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-containers-enclaves |\n| Build Intel SGX enclave apps with OSS tools | https://learn.microsoft.com/en-us/azure/confidential-computing/enclave-development-oss |\n| Use guest attestation sample app with confidential VMs | https://learn.microsoft.com/en-us/azure/confidential-computing/guest-attestation-example |\n| Run apps with Fortanix CCM and Node Agent | https://learn.microsoft.com/en-us/azure/confidential-computing/how-to-fortanix-confidential-computing-manager-node-agent |\n| Implement SKR with confidential containers on Azure Container Instances | https://learn.microsoft.com/en-us/azure/confidential-computing/skr-flow-confidential-containers-azure-container-instance |\n| Implement SKR from Key Vault to AMD SEV-SNP confidential VMs | https://learn.microsoft.com/en-us/azure/confidential-computing/skr-flow-confidential-vm-sev-snp |\n\n### Deployment\n| Topic | URL |\n|-------|-----|\n| Deploy AKS cluster with SGX enclave nodes via CLI | https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-enclave-nodes-aks-get-started |\n| Use confidential VM node pools in AKS | https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-node-pool-aks |\n| Create custom images for Azure confidential VMs with CLI | https://learn.microsoft.com/en-us/azure/confidential-computing/how-to-create-custom-image-confidential-vm |\n| Deploy Fortanix CCM as Azure managed app | https://learn.microsoft.com/en-us/azure/confidential-computing/how-to-fortanix-confidential-computing-manager |\n| Migrate nested Azure confidential VMs across regions | https://learn.microsoft.com/en-us/azure/confidential-computing/migrate-nested-confidential-vms |\n| Deploy Azure confidential VMs with ARM templates | https://learn.microsoft.com/en-us/azure/confidential-computing/quick-create-confidential-vm-arm |\n| Deploy Azure confidential VMs using Azure CLI | https://learn.microsoft.com/en-us/azure/confidential-computing/quick-create-confidential-vm-azure-cli |\n| Deploy VM scale sets with hardened Linux images | https://learn.microsoft.com/en-us/azure/confidential-computing/vmss-deployment-from-hardened-linux-image |","tags":["azure","confidential","computing","agent","skills","microsoftdocs","agent-skills","agentic-skills","agentskill","ai-agents","ai-coding","azure-functions"],"capabilities":["skill","source-microsoftdocs","skill-azure-confidential-computing","topic-agent","topic-agent-skills","topic-agentic-skills","topic-agentskill","topic-ai-agents","topic-ai-coding","topic-azure","topic-azure-functions","topic-azure-kubernetes-service","topic-azure-openai","topic-azure-sql-database","topic-azure-storage"],"categories":["Agent-Skills"],"synonyms":[],"warnings":[],"endpointUrl":"https://skills.sh/MicrosoftDocs/Agent-Skills/azure-confidential-computing","protocol":"skill","transport":"skills-sh","auth":{"type":"none","details":{"cli":"npx skills add MicrosoftDocs/Agent-Skills","source_repo":"https://github.com/MicrosoftDocs/Agent-Skills","install_from":"skills.sh"}},"qualityScore":"0.698","qualityRationale":"deterministic score 0.70 from registry signals: · indexed on github topic:agent-skills · 497 github stars · SKILL.md body (11,573 chars)","verified":false,"liveness":"unknown","lastLivenessCheck":null,"agentReviews":{"count":0,"score_avg":null,"cost_usd_avg":null,"success_rate":null,"latency_p50_ms":null,"narrative_summary":null,"summary_updated_at":null},"enrichmentModel":"deterministic:skill-github:v1","enrichmentVersion":1,"enrichedAt":"2026-04-22T06:53:29.720Z","embedding":null,"createdAt":"2026-04-18T21:58:31.597Z","updatedAt":"2026-04-22T06:53:29.720Z","lastSeenAt":"2026-04-22T06:53:29.720Z","tsv":"'/en-us/azure/confidential-computing/application-development':887 '/en-us/azure/confidential-computing/attestation':676 '/en-us/azure/confidential-computing/attestation-solutions':686 '/en-us/azure/confidential-computing/choose-confidential-containers-offerings':504 '/en-us/azure/confidential-computing/concept-skr-attestation':700 '/en-us/azure/confidential-computing/confidential-ai':596 '/en-us/azure/confidential-computing/confidential-clean-rooms':711 '/en-us/azure/confidential-computing/confidential-computing-deployment-models':513 '/en-us/azure/confidential-computing/confidential-computing-solutions':606 '/en-us/azure/confidential-computing/confidential-containers':521,530 '/en-us/azure/confidential-computing/confidential-containers-aks-security-policy':720 '/en-us/azure/confidential-computing/confidential-containers-enclaves':897 '/en-us/azure/confidential-computing/confidential-containers-on-aks-preview':811 '/en-us/azure/confidential-computing/confidential-enclave-nodes-aks-get-started':972 '/en-us/azure/confidential-computing/confidential-node-pool-aks':982 '/en-us/azure/confidential-computing/confidential-nodes-aks-addon':821 '/en-us/azure/confidential-computing/confidential-nodes-aks-faq':478 '/en-us/azure/confidential-computing/confidential-nodes-aks-overview':616 '/en-us/azure/confidential-computing/confidential-vm-faq':492 '/en-us/azure/confidential-computing/confidential-vm-overview':540 '/en-us/azure/confidential-computing/disable-confidential-vm-metadata-blob':835 '/en-us/azure/confidential-computing/enclave-aware-containers':627 '/en-us/azure/confidential-computing/enclave-development-oss':908 '/en-us/azure/confidential-computing/gpu-options':551 '/en-us/azure/confidential-computing/guest-attestation-confidential-virtual-machines-design':637 '/en-us/azure/confidential-computing/guest-attestation-confidential-vms':730 '/en-us/azure/confidential-computing/guest-attestation-defender-for-cloud':743 '/en-us/azure/confidential-computing/guest-attestation-example':919 '/en-us/azure/confidential-computing/harden-a-linux-image-to-remove-azure-guest-agent':754 '/en-us/azure/confidential-computing/harden-the-linux-image-to-remove-sudo-users':767 '/en-us/azure/confidential-computing/how-to-create-custom-image-confidential-vm':994 '/en-us/azure/confidential-computing/how-to-fortanix-confidential-computing-manager':1004 '/en-us/azure/confidential-computing/how-to-fortanix-confidential-computing-manager-node-agent':930 '/en-us/azure/confidential-computing/how-to-leverage-virtual-tpms-in-azure-confidential-vms':777 '/en-us/azure/confidential-computing/key-rotation-offline':847 '/en-us/azure/confidential-computing/migrate-nested-confidential-vms':1014 '/en-us/azure/confidential-computing/multi-party-data':649 '/en-us/azure/confidential-computing/overview-azure-products':559 '/en-us/azure/confidential-computing/quick-create-confidential-vm-arm':1024 '/en-us/azure/confidential-computing/quick-create-confidential-vm-azure-cli':1034 '/en-us/azure/confidential-computing/secret-key-management':788 '/en-us/azure/confidential-computing/skr-flow-confidential-containers-azure-container-instance':942 '/en-us/azure/confidential-computing/skr-flow-confidential-vm-sev-snp':957 '/en-us/azure/confidential-computing/skr-policy-examples':859 '/en-us/azure/confidential-computing/use-cases-scenarios':568 '/en-us/azure/confidential-computing/virtual-machine-metablob-disk':870 '/en-us/azure/confidential-computing/virtual-machine-options':580 '/en-us/azure/confidential-computing/virtual-machine-solutions-sgx':664 '/en-us/azure/confidential-computing/virtual-tpms-in-azure-confidential-vm':799 '/en-us/azure/confidential-computing/vmss-deployment-from-hardened-linux-image':1045 '/microsoftdocs/mcp/blob/main/readme.md)':166 '3':137 'accept':205 'access':171 'across':1010 'agent':86,130,189,203,751,927 'ai':315,590 'ak':35,219,306,367,382,448,472,612,624,715,807,813,962,979 'amd':575,949 'amd/intel':275 'analyt':311,642 'app':424,902,913,921,1001 'appli':586 'applic':622 'architect':638 'architectur':18,55,288,294,581 'arm':465,1020 'attest':350,417,633,669,678,723,740,911 'author':848 'avail':156 'awar':620 'azur':2,8,36,46,248,270,301,339,362,378,444,483,498,506,515,527,534,542,553,561,570,593,600,629,644,661,671,681,692,702,725,749,783,793,830,842,854,884,937,987,999,1007,1016,1026,1030 'azure-confidential-comput':1 'best':14,51,238,260,479 'blob':388,828 'build':313,414,898 'capabl':78,280,537 'capac':341 'case':284,565 'categori':89,97,113,209,211 'ccm':461,924,997 'choos':269,326,505,533,560 'clean':371,704 'cli':463,969,991,1031 'cloud':737 'cluster':963 'code':26,63,404,409,872 'collabor':708 'combin':68 'common':223 'compat':237 'comput':4,10,38,48,272,474,508,547,555,563,588,602,646,697,785 'confcom':818 'confidenti':3,9,37,47,220,249,271,302,363,368,379,385,423,445,451,473,484,499,507,516,524,535,543,554,562,571,587,601,630,645,682,696,703,716,726,732,763,773,784,794,804,831,843,855,866,889,915,934,953,974,988,1008,1017,1027 'configur':24,61,226,373,377,668,721,800,803,812,822 'consider':345 'contain':276,369,386,426,500,517,525,621,717,805,890,935,938 'container':317 'content':73,175 'cover':49 'creat':454,983 'custom':455,838,984 'customer-manag':837 'decis':16,53,262,493 'defend':735 'deploy':29,66,228,278,330,435,441,509,654,958,961,995,1015,1025,1035 'descript':213 'design':19,56,289,297,582,597,617,634 'develop':11,877 'devic':816 'disk':402,864 'doc':181 'document':76,174 'e.g':101,117 'enabl':336 'enclav':305,366,609,619,673,882,894,901,966 'enclave-awar':618 'error':224 'expert':5,43 'fallback':193 'faq':231,243,470,486 'featur':770 'fetch':77,173,182,195 'file':107,115,122,127 'flow':429 'fortanix':460,923,996 'fortanix/key':432 'github.com':165 'github.com/microsoftdocs/mcp/blob/main/readme.md)':164 'gpus':277,544 'guarante':254 'guest':632,722,739,750,910 'guid':163 'guidanc':44,245,267,298,324,356,489 'handl':353 'harden':355,744,755,1040 'imag':456,746,757,985,1042 'implement':931,943 'import':84,128 'includ':12,340,427 'index':90,210 'instal':160,162 'instanc':939 'integr':25,62,403,434,871 'intel':333,418,577,657,814,880,892,899 'issu':222 'key':392,395,689,693,781,840,850,946 'key/secrets':352 'knowledg':6 'l100':376 'l101':407 'l101-l111':406 'l111':408 'l112':437 'l112-l122':436 'l120':104 'l122':438 'l35':103 'l35-l120':102 'l37':216 'l37-l41':215 'l41':217 'l42':241 'l42-l46':240 'l46':242 'l47':265 'l47-l59':264 'l59':266 'l60':292 'l60-l69':291 'l69':293 'l70':322 'l70-l74':321 'l74':323 'l75':348 'l75-l90':347 'l90':349 'l91':375 'l91-l100':374 'latest':145 'learn':188,202 'learn-agent-skil':187,201 'learn.microsoft.com':477,491,503,512,520,529,539,550,558,567,579,595,605,615,626,636,648,663,675,685,699,710,719,729,742,753,766,776,787,798,810,820,834,846,858,869,886,896,907,918,929,941,956,971,981,993,1003,1013,1023,1033,1044 'learn.microsoft.com/en-us/azure/confidential-computing/application-development':885 'learn.microsoft.com/en-us/azure/confidential-computing/attestation':674 'learn.microsoft.com/en-us/azure/confidential-computing/attestation-solutions':684 'learn.microsoft.com/en-us/azure/confidential-computing/choose-confidential-containers-offerings':502 'learn.microsoft.com/en-us/azure/confidential-computing/concept-skr-attestation':698 'learn.microsoft.com/en-us/azure/confidential-computing/confidential-ai':594 'learn.microsoft.com/en-us/azure/confidential-computing/confidential-clean-rooms':709 'learn.microsoft.com/en-us/azure/confidential-computing/confidential-computing-deployment-models':511 'learn.microsoft.com/en-us/azure/confidential-computing/confidential-computing-solutions':604 'learn.microsoft.com/en-us/azure/confidential-computing/confidential-containers':519,528 'learn.microsoft.com/en-us/azure/confidential-computing/confidential-containers-aks-security-policy':718 'learn.microsoft.com/en-us/azure/confidential-computing/confidential-containers-enclaves':895 'learn.microsoft.com/en-us/azure/confidential-computing/confidential-containers-on-aks-preview':809 'learn.microsoft.com/en-us/azure/confidential-computing/confidential-enclave-nodes-aks-get-started':970 'learn.microsoft.com/en-us/azure/confidential-computing/confidential-node-pool-aks':980 'learn.microsoft.com/en-us/azure/confidential-computing/confidential-nodes-aks-addon':819 'learn.microsoft.com/en-us/azure/confidential-computing/confidential-nodes-aks-faq':476 'learn.microsoft.com/en-us/azure/confidential-computing/confidential-nodes-aks-overview':614 'learn.microsoft.com/en-us/azure/confidential-computing/confidential-vm-faq':490 'learn.microsoft.com/en-us/azure/confidential-computing/confidential-vm-overview':538 'learn.microsoft.com/en-us/azure/confidential-computing/disable-confidential-vm-metadata-blob':833 'learn.microsoft.com/en-us/azure/confidential-computing/enclave-aware-containers':625 'learn.microsoft.com/en-us/azure/confidential-computing/enclave-development-oss':906 'learn.microsoft.com/en-us/azure/confidential-computing/gpu-options':549 'learn.microsoft.com/en-us/azure/confidential-computing/guest-attestation-confidential-virtual-machines-design':635 'learn.microsoft.com/en-us/azure/confidential-computing/guest-attestation-confidential-vms':728 'learn.microsoft.com/en-us/azure/confidential-computing/guest-attestation-defender-for-cloud':741 'learn.microsoft.com/en-us/azure/confidential-computing/guest-attestation-example':917 'learn.microsoft.com/en-us/azure/confidential-computing/harden-a-linux-image-to-remove-azure-guest-agent':752 'learn.microsoft.com/en-us/azure/confidential-computing/harden-the-linux-image-to-remove-sudo-users':765 'learn.microsoft.com/en-us/azure/confidential-computing/how-to-create-custom-image-confidential-vm':992 'learn.microsoft.com/en-us/azure/confidential-computing/how-to-fortanix-confidential-computing-manager':1002 'learn.microsoft.com/en-us/azure/confidential-computing/how-to-fortanix-confidential-computing-manager-node-agent':928 'learn.microsoft.com/en-us/azure/confidential-computing/how-to-leverage-virtual-tpms-in-azure-confidential-vms':775 'learn.microsoft.com/en-us/azure/confidential-computing/key-rotation-offline':845 'learn.microsoft.com/en-us/azure/confidential-computing/migrate-nested-confidential-vms':1012 'learn.microsoft.com/en-us/azure/confidential-computing/multi-party-data':647 'learn.microsoft.com/en-us/azure/confidential-computing/overview-azure-products':557 'learn.microsoft.com/en-us/azure/confidential-computing/quick-create-confidential-vm-arm':1022 'learn.microsoft.com/en-us/azure/confidential-computing/quick-create-confidential-vm-azure-cli':1032 'learn.microsoft.com/en-us/azure/confidential-computing/secret-key-management':786 'learn.microsoft.com/en-us/azure/confidential-computing/skr-flow-confidential-containers-azure-container-instance':940 'learn.microsoft.com/en-us/azure/confidential-computing/skr-flow-confidential-vm-sev-snp':955 'learn.microsoft.com/en-us/azure/confidential-computing/skr-policy-examples':857 'learn.microsoft.com/en-us/azure/confidential-computing/use-cases-scenarios':566 'learn.microsoft.com/en-us/azure/confidential-computing/virtual-machine-metablob-disk':868 'learn.microsoft.com/en-us/azure/confidential-computing/virtual-machine-options':578 'learn.microsoft.com/en-us/azure/confidential-computing/virtual-machine-solutions-sgx':662 'learn.microsoft.com/en-us/azure/confidential-computing/virtual-tpms-in-azure-confidential-vm':797 'learn.microsoft.com/en-us/azure/confidential-computing/vmss-deployment-from-hardened-linux-image':1043 'leverag':768 'limit':21,58,225,255,319,331,650 'line':99,111,212 'link':116,125 'linux':745,756,772,1041 'local':69 'locat':93 'machin':400,862 'make':17,54,263,494 'manag':778,839,1000 'markdown':192,208 'mcp':151,178 'metablob':401,863 'metadata.generated':132 'microsoft':180 'microsoftdoc':152,179 'migrat':443,1005 'model':279,510,713 'monitor':361 'month':138 'multi':309,640 'multi-parti':308,639 'nest':1006 'network':170 'node':221,452,475,610,926,967,976 'offer':501 'offload':548 'old':139 'oper':259 'opt':390,824 'opt-out':389,823 'option':273,518,573,603 'oss':904 'overview':522 'parti':310,641 'pattern':20,27,57,64,290,295,405,410,583,873 'perform':256 'plan':342 'plugin':384,817 'polici':397,852 'pool':453,977 'practic':15,52,239,261,480 'prefer':176 'preview':808 'price':257 'problem':229 'product':281,556 'provid':42 'pull':143 'queri':184,198 'quick':71 'quick-refer':70 'quota':22,59,320,328,651 'rang':100 'read':106,121 'refer':72,126 'region':1011 'releas':396,690,851 'relev':94 'remot':75 'remov':748,759 'repositori':149 'requir':169 'return':191,207 'room':372,705 'rotat':393,836 'run':359,415,888,920 'sampl':412,912 'scale':344,1037 'scenario':252 'secret':779 'section':95 'secur':23,60,234,253,286,314,346,358,394,546,665,688,707,712,731,796,849 'security.md':118,119 'select':497,552,569 'set':458,1038 'setup':233 'sev':421,951 'sev-snp':420,950 'sgx':304,335,365,449,608,658,672,815,881,893,900,965 'sgx-enabl':334 'sgx/amd':419 'sgx/device':383 'sgx/sev-snp':33 'size':327,656 'skill':39,41,83,168,190,204 'skill-azure-confidential-computing' 'skr':428,932,944 'snp':422,952 'solut':598 'source-microsoftdocs' 'specifi':110 'string':185,199 'sudo':760 'suggest':140,157 'support':251 'tee':856 'templat':466,1021 'text/markdown':206 'tool':153,430,878,905 'topic':468,481,495,584,652,666,801,874,959 'topic-agent' 'topic-agent-skills' 'topic-agentic-skills' 'topic-agentskill' 'topic-ai-agents' 'topic-ai-coding' 'topic-azure' 'topic-azure-functions' 'topic-azure-kubernetes-service' 'topic-azure-openai' 'topic-azure-sql-database' 'topic-azure-storage' 'tpms':791 'troubleshoot':13,50,214,218,467 'type':679 'understand':514,531,628 'url':469,482,496,585,653,667,802,875,960 'usag':488 'use':30,32,81,87,105,120,177,194,247,283,300,462,541,564,607,677,687,701,789,860,876,909,973,1029 'user':142,159,761 'vault':433,694,947 'version':146 'via':968 'virtual':399,790,861 'vm':485,536,572,631,975,1036 'vmmd':387,827 'vms':34,250,274,303,337,364,380,659,727,733,764,774,795,832,844,867,916,954,989,1009,1018,1028 'vms/vmss':446 'vtpm':351,769 'webpag':196 'workload':236,287,318,591,613,683","prices":[{"id":"07f2a37a-8280-4588-a1ee-2e502abac31d","listingId":"3f0b129b-234d-4e47-814c-ca2208bd270f","amountUsd":"0","unit":"free","nativeCurrency":null,"nativeAmount":null,"chain":null,"payTo":null,"paymentMethod":"skill-free","isPrimary":true,"details":{"org":"MicrosoftDocs","category":"Agent-Skills","install_from":"skills.sh"},"createdAt":"2026-04-18T21:58:31.597Z"}],"sources":[{"listingId":"3f0b129b-234d-4e47-814c-ca2208bd270f","source":"github","sourceId":"MicrosoftDocs/Agent-Skills/azure-confidential-computing","sourceUrl":"https://github.com/MicrosoftDocs/Agent-Skills/tree/main/skills/azure-confidential-computing","isPrimary":false,"firstSeenAt":"2026-04-18T21:58:31.597Z","lastSeenAt":"2026-04-22T06:53:29.720Z"}],"details":{"listingId":"3f0b129b-234d-4e47-814c-ca2208bd270f","quickStartSnippet":null,"exampleRequest":null,"exampleResponse":null,"schema":null,"openapiUrl":null,"agentsTxtUrl":null,"citations":[],"useCases":[],"bestFor":[],"notFor":[],"kindDetails":{"org":"MicrosoftDocs","slug":"azure-confidential-computing","github":{"repo":"MicrosoftDocs/Agent-Skills","stars":497,"topics":["agent","agent-skills","agentic-skills","agentskill","ai","ai-agents","ai-coding","azure","azure-functions","azure-kubernetes-service","azure-openai","azure-sql-database","azure-storage","azure-virtual-machine","claude-code","github-copilot","microsoft-learn","openai-codex","skills"],"license":"cc-by-4.0","html_url":"https://github.com/MicrosoftDocs/Agent-Skills","pushed_at":"2026-04-22T01:37:27Z","description":"Curated Agent Skills for Microsoft & Azure – giving AI coding assistants structured, real-time expertise from Microsoft Learn docs.","skill_md_sha":"4d21b6ec37a5fbf3cb9ddf16929e2583b64cbf2f","skill_md_path":"skills/azure-confidential-computing/SKILL.md","default_branch":"main","skill_tree_url":"https://github.com/MicrosoftDocs/Agent-Skills/tree/main/skills/azure-confidential-computing"},"layout":"multi","source":"github","category":"Agent-Skills","frontmatter":{"name":"azure-confidential-computing","description":"Expert knowledge for Azure Confidential Computing development including troubleshooting, best practices, decision making, architecture & design patterns, limits & quotas, security, configuration, integrations & coding patterns, and deployment. Use when using SGX/SEV-SNP VMs, AKS confidential containers, SKR with Key Vault/Fortanix, vTPM, or attestation APIs, and other Azure Confidential Computing related development tasks. Not for Azure Virtual Enclaves (use azure-virtual-enclaves), Azure Virtual Machines (use azure-virtual-machines), Azure Dedicated HSM (use azure-dedicated-hsm), Azure Attestation (use azure-attestation).","compatibility":"Requires network access. Uses mcp_microsoftdocs:microsoft_docs_fetch or fetch_webpage to retrieve documentation."},"skills_sh_url":"https://skills.sh/MicrosoftDocs/Agent-Skills/azure-confidential-computing"},"updatedAt":"2026-04-22T06:53:29.720Z"}}