Chapter 7. Configuring a RHEL VM on Azure with Intel TDX


By using Intel Trusted Domain Extensions (TDX), you can create hardware-assisted isolated VMs known as trusted domains (TDs). It ensures that only the VM has access to its resources, while remaining inaccessible to hypervisors and hosts.

Prerequisites

Procedure

  1. Log in to Azure by using the azure cli utility:

    $ az login
    Copy to Clipboard Toggle word wrap
  2. Create an Azure resource group for the selected availability zone:

    $ az group create --name <example_resource_group> --location westeurope
    Copy to Clipboard Toggle word wrap
  3. Deploy a RHEL instance with TDX enabled, for example, the Standard_DC2eds_v5 instance type:

    $ az vm create --resource-group <example_resource_group> \
    --name <example_rhel_instance> \
    --image <"RedHat:rhel-cvm:9_5_cvm:latest"> \
    --size <Standard_DC2eds_v5> \
    --admin-username <example_azure_user> \
    --generate-ssh-keys \
    --security-type ConfidentialVM \
    --os-disk-security-encryption-type DiskWithVMGuestState
    Copy to Clipboard Toggle word wrap
  4. Connect to the RHEL instance:

    $ ssh <example_azure_user>@<example_ip_address_of_the_instance>
    Copy to Clipboard Toggle word wrap

Verification

  • Check kernel logs to verify status of TDX:

    $ sudo dmesg | grep -i tdx
    Copy to Clipboard Toggle word wrap
    ...
    [    0.733613] Memory Encryption Features active: Intel TDX
    [    4.320222] systemd[1]: Detected confidential virtualization tdx.
    [    5.977432] systemd[1]: Detected confidential virtualization tdx.
    ...
    Copy to Clipboard Toggle word wrap
  • Check metadata of the RHEL instance configuration:

    $ az vm show --resource-group <example_resource_group> \
    --name <example_rhel_instance> \
    --query "securityProfile.enableTrustedDomainExtensions" \
    --output json
    Copy to Clipboard Toggle word wrap
Red Hat logoGithubredditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust. Explore our recent updates.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

Theme

© 2026 Red Hat
Back to top