Search Results for

    Show / Hide Table of Contents

    · 02/06/2025 ·

    Trusted Execution Environments (TEE)

    A trusted execution environment (TEE) helps to protect user-executed code and data from modification by untrusted software, hardware, and system components outside the TEE's boundaries. TEEs can provide a high level of protection against most software-based attacks and many hardware-based attacks and give assurance that the software and hardware in the TEE have not been tampered with.

    Intel Trust Authority currently supports Intel® Software Guard Extensions (Intel® SGX) and Intel® Trust Domain Extension (Intel® TDX) TEEs. Support for more TEEs is planned for future releases of Intel Trust Authority. To understand how to use Intel Trust Authority services, you need a working knowledge of the underlying TEE technology. To learn more about Intel SGX and Intel TDX, see Next Steps below.

    A TEE running directly on an Intel SGX-enabled platform is called an enclave. An Intel TDX virtual machine (VM) TEE running on an Intel SGX-enabled platform is called a trust domain.

    Every TEE has a trusted computing base (TCB) that includes all the software, firmware, and hardware resources within the boundaries of the TEE. When a new enclave or trust domain is instantiated, the TEE's TCB must be verified (attested) before it can be trusted with sensitive workloads and data. For more information, see Intel Trust Authority Attestation.

    The attesting TEE collects cryptographic keys and platform collaterals, called a quote, as evidence to support its claim of authenticity. Evidence is collected by low-level attestation primitives (hardware drivers, essentially) for the TEE platform.

    Intel Trust Authority provides several ways to interact with a TEE to facilitate the migration of existing applications to Intel Trust Authority and simplify new application development.

    • Your TEE workload handles the low-level code to create a quote and then calls the Intel Trust Authority REST API or TDX CLI (for Intel TDX trust domains only) for attestation services. This is most useful for migrating existing applications to Intel Trust Authority attestation.
    • You can use the Intel Trust Authority Go client libraries to integrate Intel SGX or Intel TDX attestation into your application. The Intel Trust Authority client library handles the low-level calls to platform-specific attestation primitives for the TEE. The client library masks some of the complexity of working with TEEs, making it the preferred option for new development. Currently, only the Go language is supported for integration. Support for more languages is planned for future releases of Intel Trust Authority.
    • You can migrate existing Microsoft Azure Attestation (MAA) applications to use Intel Trust Authority attestation. In this case, your existing Microsoft Azure TEE application code is responsible for creating the quote in a format that is compatible with MAA. The Intel Trust Authority MAA Adaptor accepts quotes in MAA format for remote attestation by Intel Trust Authority. For more information, see the MAA Adapter Service

    Next steps

    Intel SGX and Intel TDX primary resources:

    • Intel SGX main page
    • Intel TDX main page

    Intel Trust Authority TEE integrations:

    • Intel Trust Authority Go Client
    • TDX CLI
    • Gramine client

    * Other names and brands may be claimed as the property of others.

    In this article
    Back to top Notice & Disclaimer