Search Results for

    Show / Hide Table of Contents

    User roles and API keys

    User roles and API keys are provisioned through the Intel® Trust Authority web portal. The user role determines the type of API keys you can access. This article explains the relationship between user roles and API keys.

    User roles

    Intel Trust Authority has two types of user roles, users and tenant admins. Your subscription determines the number of each user type.

    Users

    Your subscription determines the number of users allowed in your instance of Intel Trust Authority. A Starter plan allows five users, while an Enterprise plan allows unlimited users. Users can modify all Intel Trust Authority resources except other users and admin API keys. The keys can be integrated into the application workflow when an attestation is requested.

    Tenant admins

    Tenant admins interact with Intel Trust Authority through the Intel Trust Authority portal, the CLI, and REST APIs. Your service plan determines the number of tenant admins. A Starter plan allows one tenant admin, while an Enterprise plan allows up to five tenant admins. Tenant admins can manage all Intel Trust Authority resources, including other users and admin API keys. Tenant admins use the admin API keys to interact with Intel Trust Authority using the CLI and REST APIs.

    Important

    Intel recommends enabling more than one tenant administrator account for redundancy purposes.

    The following table lists the resources for each user role.

    Resource User Tenant Admin
    Attestation API Keys X X
    Policies X X
    Tags X X
    Users X
    Admin API keys X
    Reports X X
    Web UI X X

    API keys

    Two types of API keys are provided to clients to manage resources: Attestation API keys and Admin API keys. User roles determine which API keys can be accessed through the portal. Users can only access attestation API keys, while tenant admins can access both attestation and admin API keys. API keys have a tenant-wide scope. Attestation APK keys and report data are visible to all users.

    Tenant Admin API keys

    Each tenant is issued two Admin API keys accessible through the UI. Admin API keys are required by the Intel Trust Authority CLI and REST APIs, and they allow you to access all the same functions managed in the portal. (An exception is retrieving the value of an Attestation or Admin API key, which can only be done through the portal.) An Admin API key can't be used for attestation-related APIs, such as getting a nonce or an attestation token.

    Warning

    Intel recommends rotating the Admin API keys whenever a Tenant Admin user is removed, or "downgraded" to User. The Admin API keys previously accessible to the former Tenant Admin remain active and usable unless rotated.

    Attestation API keys

    Both tenant admins and users have access to attestation API keys through the portal. The number of attestation API keys for an instance of Intel Trust Authority is determined by the subscription type. A Starter subscription is given one API key, while an Enterprise subscription is given multiple API keys. Attestation API keys are used for all attestation-related functions such as, the Microsoft Azure Attestation adaptor and Faithful Verification. This key cannot be used for other tasks, such as managing policies, tags, or other users.

    The following table lists the resources each API can manage.

    Resource Admin API Attestation API
    Attestation X
    Nonce X
    Policies X
    Tags X
    Users X
    Admin API keys X
    Reports - Faithful Verifications X

    Rotating admin and attestation API keys

    Admin and attestation API keys control every aspect of Intel Trust Authority, from verifying workloads to creating users. Intel® recommends that a regular rotation schedule be implemented to help keep your system secure. When an administrator is eliminated from the system, the API keys to which they had access are not eliminated. Keeping a rotational schedule helps prevent unwanted access to API keys.

    In this article
    Back to top Notice & Disclaimer