Workload Identity for Confidential Computing - 2025-10-28
Confidential Computing Consortium via YouTube
-
34
-
- Write review
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore workload identity management within confidential computing environments in this 54-minute conference talk from the Confidential Computing Consortium. Learn how to establish, verify, and manage identities for workloads running in trusted execution environments (TEEs) and secure enclaves. Discover the challenges of identity attestation in confidential computing scenarios where traditional identity mechanisms may not apply due to the isolated and encrypted nature of the compute environment. Examine practical approaches for implementing workload identity solutions that maintain security guarantees while enabling necessary authentication and authorization processes. Understand the relationship between hardware-based attestation, cryptographic proofs, and workload identity establishment in confidential computing architectures. Gain insights into industry best practices for deploying identity management systems that preserve the confidentiality and integrity properties essential to confidential computing workloads.
Syllabus
Workload Identity for Confidential Computing - 2025-10-28
Taught by
Confidential Computing Consortium