Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
The members in an Azure Managed CCF(Managed CCF) resource can be viewed on the Azure portal or via CLI. This tutorial builds on the Managed CCF resource created in the Quickstart: Create an Azure Managed CCF resource tutorial.
Download the service identity
An Azure Managed CCF resource has a unique identity called the service identity, represented by a certificate and created during the resource creation. Every individual node that is part of the Azure Managed CCF resource has its self-signed certificate, endorsed by the service identity, which establishes trust on it.
Customers are recommended to download the service identity certificate and use it to establish a TLS connection when interacting with the service. The following command downloads the certificate and saves it into service_cert.pem.
curl https://identity.confidential-ledger.core.azure.com/ledgerIdentity/confidentialbillingapp --silent | jq ' .ledgerTlsCertificate' | xargs echo -e > service_cert.pem
View the members
Azure portal
Navigate to the Managed CCF resource page.
Under Operations, select the Members link. This is a view only page. To manage the members, follow the instructions at manage members.
Command Line Interface
curl --cacert service_cert.pem https://confidentialbillingapp.confidential-ledger.azure.com/gov/members | jq
{
"3d08a5ddcb6fe939088b3f8f55040d069ba2f73e1946739b2a30910d7c60b011": {
"cert": "-----BEGIN CERTIFICATE-----\nMIIBtjCCATyg...zWP\nGeRSybu3EpITPg==\n-----END CERTIFICATE-----",
"member_data": {
"group": "IT",
"identifier": "member0"
},
"public_encryption_key": null,
"status": "Active"
},
"9a403f4811f3e3a5eb21528088d6619ad7f6f839405cf737b0e8b83767c59039": {
"cert": "-----BEGIN CERTIFICATE-----\nMIIB9zCCAX2gAwIBAgIQeA...lf8wPx0uzNRc1iGM+mv\n-----END CERTIFICATE-----",
"member_data": {
"is_operator": true,
"owner": "Microsoft Azure"
},
"public_encryption_key": "-----BEGIN PUBLIC KEY-----\nMIIBIjANBgkqhki...DAQAB\n-----END PUBLIC KEY-----\n",
"status": "Active"
}
}
The output shows two active members in the resource. One is an operator member (identified by the is_operator field) and the other was added during deployment. An active member can submit a proposal to add or remove other members. Refer to the how-to-manage-members guide for the instructions.