[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-09-04。"],[[["\u003cp\u003eConfidential VM attestation tokens are JSON Web Tokens (JWT) obtained from the \u003ccode\u003ewell-known\u003c/code\u003e endpoint, providing information about the Confidential VM instance.\u003c/p\u003e\n"],["\u003cp\u003eThese tokens comply with the OpenID Connect 1.0 specification and support the \u003ccode\u003eRS256\u003c/code\u003e signing algorithm, containing claims like \u003ccode\u003eaud\u003c/code\u003e, \u003ccode\u003eexp\u003c/code\u003e, \u003ccode\u003eiat\u003c/code\u003e, \u003ccode\u003eiss\u003c/code\u003e, and \u003ccode\u003enbf\u003c/code\u003e to define token parameters.\u003c/p\u003e\n"],["\u003cp\u003eThe tokens include specific claims, such as \u003ccode\u003edbgstat\u003c/code\u003e for hardware debug status, \u003ccode\u003eeat_nonce\u003c/code\u003e for custom nonces, \u003ccode\u003ehwmodel\u003c/code\u003e for hardware identification, and \u003ccode\u003esecboot\u003c/code\u003e for secure boot verification.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003esubmods\u003c/code\u003e claim contains further details, including Compute Engine claims with \u003ccode\u003einstance_id\u003c/code\u003e, \u003ccode\u003einstance_name\u003c/code\u003e, \u003ccode\u003eproject_id\u003c/code\u003e, \u003ccode\u003eproject_number\u003c/code\u003e, and \u003ccode\u003ezone\u003c/code\u003e to identify the VM's operational context.\u003c/p\u003e\n"],["\u003cp\u003eThe token issuer is always \u003ccode\u003ehttps://confidentialcomputing.googleapis.com\u003c/code\u003e and these tokens contain \u003ccode\u003egoogle_service_accounts\u003c/code\u003e to define service accounts running in the Confidential VM workload.\u003c/p\u003e\n"]]],[],null,["# Confidential VM token claims\n\nThis document describes the items that are present in Confidential VM\nattestation tokens, as defined in the\n[`well-known` endpoint](https://confidentialcomputing.googleapis.com/.well-known/openid-configuration)\nfor Confidential VM. The tokens are JSON web tokens (JWT).\n\nExample token\n-------------\n\nThe following is an example of an encoded attestation token. You can use\n\u003chttps://jwt.io/\u003e to decode it: \n\n eyJhbGciOiJSUzI1NiIsImtpZCI6IjFjNjdmYWVhYjRhYzE1ZDJmNmZmODMwY2E2ZmM1N2YyYmVhM2Y0YmIiLCJ0eXAiOiJKV1QifQ.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.Z8CIreuWj8vQKe9L5f5Ol80LcWBI_pFWwfT8qsky8hjtH3OMmqfUCJJRx-dX5Rqm5n4qe4dHacLgSWQlT9MDYyrtWDuocA2WtfPZLvM0DNc4HuoNPZtVrgMMcZ93Xyl5-tJuI5PbPshiDBT06_QaRm5l37RRL2CsxXZGCkKsxV1vs0gF5xZgSNmhDqg3q1fONhA3VglZ-H0SHAvMNr1qwXDKrQxdYxyFfEMLkcsRxSXlR5mLCbMIFptGTPXt-k83xJzCipuKSiKJrwaRdZTmlapn7UtaTRLvG3YCmXPg6oOvNKtE8T4KeBY36EdzR0Fdmz_pXSbWL-q8-y90VxDxwQ\n\nThe following is an example of a decoded token: \n\n {\n \"alg\": \"RS256\",\n \"kid\": \"6e66f1aededf736581df2599ee20387718978dcd\",\n \"typ\": \"JWT\"\n }.\n {\n \"aud\": \"\u003cYOURAUDIENCE\u003e\",\n \"exp\": 1715359550,\n \"iat\": 1715355950,\n \"iss\": \"https://confidentialcomputing.googleapis.com\",\n \"nbf\": 1698861565,\n \"sub\": \"https://www.googleapis.com/compute/v1/projects/\u003cYOURPROJECT\u003e/zones/us-central1-c/instances/cvm-token-claims\",\n \"eat_nonce\": [\n \"thisIsAcustomNonce\",\n \"thisIsAMuchLongerCustomNonceWithPaddingFor74Bytes0000000000000000000000000\"\n ],\n \"secboot\": true,\n \"oemid\": 11129,\n \"hwmodel\": \"GCP_AMD_SEV\",\n \"swname\": \"Compute Engine\",\n \"dbgstat\": \"disabled-since-boot\",\n \"submods\": {\n \"gce\": {\n \"zone\": \"us-central1-c\",\n \"project_id\": \"\u003cYOURPROJECT\u003e\",\n \"project_number\": \"470652426305\",\n \"instance_name\": \"cvm-token-claims\",\n \"instance_id\": \"7333251546816446069\"\n }\n },\n \"google_service_accounts\": [\n \"470652426305-compute@developer.gserviceaccount.com\"\n ]\n }\n\nThe items within the token are further explained in the following sections.\n\nToken items\n-----------\n\nThe following table describes the high-level items in an attestation token.\nThese items are compliant with the\n[OpenID Connect 1.0 specification](https://openid.net/specs/openid-connect-core-1_0.html).\n\nTop-level claims\n----------------\n\nThe following table describes the top-level supported claims in the attestation\ntoken.\n\nSubmods claims\n--------------\n\nThe following table describes the `submods` claims in the attestation token.\n\n### Compute Engine claims\n\nThe following table describes the `gce` claims in the attestation token.\n\nWhat's next\n-----------\n\n- See the IETF draft for\n [The Entity Attestation Token (EAT)](https://datatracker.ietf.org/doc/html/draft-ietf-rats-eat-22)\n for more information on attestation claims.\n\n- See the\n [OpenID Connect Core 1.0](https://openid.net/specs/openid-connect-core-1_0.html)\n for more information on OpenID token claims.\n\n- For more information about tokens and retrieving them, see\n [vTPM Attestation Codelab](https://codelabs.developers.google.com/codelabs/vtpm-remote-attestation-on-confidential-virtual-machine)."]]