Skip to content

Commit 5e4a502

Browse files
Merge pull request #2489 from GabstaMSFT/FIPSUpdates
Updated FIPS guidance
2 parents ce86808 + 4ec19d0 commit 5e4a502

File tree

1 file changed

+9
-5
lines changed

1 file changed

+9
-5
lines changed

articles/virtual-machines/extensions/agent-linux-fips.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,10 +12,13 @@ ms.date: 09/25/2025
1212
---
1313
# FIPS 140-3 support for Azure Linux VM Extensions and Guest Agent
1414

15-
[What is the Federal Information Processing Standards (FIPS)](https://www.nist.gov/standardsgov/compliance-faqs-federal-information-processing-standards-fips)
15+
> [!NOTE]
16+
> This feature is currently in **Public Preview**, production workloads are supported.
1617
1718
Linux Virtual Machine (VM) Extensions currently comply with FIPS 140-2 but updates to the platform were required to add support for FIPS 140-3. These changes are currently being enabled across the Commercial Cloud and Azure Government Clouds. Linux VM Extensions that use protected settings are also being updated to be able to use a FIPS 140-3 compliant encryption algorithm. This document helps enable support for FIPS 140-3 on Linux VMs where compliance with FIPS 140-3 is enforced. This change isn't needed on Windows images due to the way FIPS compliance is implemented.
1819

20+
- [What is the Federal Information Processing Standards (FIPS)](https://www.nist.gov/standardsgov/compliance-faqs-federal-information-processing-standards-fips)
21+
1922
## Confirmed Supported Extensions
2023

2124
- MICROSOFT.AKS.COMPUTE.AKS.LINUX.AKSNODE
@@ -92,6 +95,9 @@ az feature list | jq '.[] | select(.name=="Microsoft.Compute/OptInToFips1403Comp
9295

9396
There are different methods available for opting-in each VM. The changes can be made at deployment for a new VM, or an existing VM can be altered to add the FIPS 140-3 enablement on the Azure platform.
9497

98+
> [!WARNING]
99+
> We do not recommend using the below Opt-In methods on RedHat 9.5 and 9.6 using version 2.7.0.6 of WALinuxAgent on production systems. This is due to an issue that will surface after rebooting, after the FIPS enablement and subsequent reboot. In these VMs the `waagent.service` will enter an internal loop and never come to a "Ready" state, and because of this error, no extensions are able to function. For testing you can try the below "RedHat 9 Workaround".
100+
95101
#### Deploying a new VM
96102

97103
In order to deploy a new VM with FIPS 140-3 enablement turned on immediately, use an ARM Template or CLI and add the `enableFips1403Encryption` property to the `additionalCapabilities` section of the `virtualMachines` object definition
@@ -196,12 +202,10 @@ Minimum [Goal State Agent](https://github.com/Azure/WALinuxAgent/wiki/FAQ#what-d
196202
AutoUpdate.Enabled=y
197203
```
198204

199-
> [!WARNING]
200-
> For RedHat 9 versions using version 2.7.0.6 of WALinuxAgent, there's an issue that will surface after rebooting, after the FIPS enablement and subsequent reboot. In these VMs the `waagent.service` will enter an internal loop and never come to a "Ready" state, and because of this error, no extensions are able to function.
201-
202205
##### RedHat 9 Workaround
203206

204-
Updating the Azure guest agent outside of the RedHat repositories, such as downloading the agent code from GitHub, is not advised. Doing an 'out-of-band' update in this way will cause inconsistent behavior with future package updates. Instead use the following code modification to remove a single function call and restore functionality
207+
> [!NOTE]
208+
> This workaround is intended for testing purposes only and does not support all VM deployment scenarios. After enabling FIPS on a running VM, execute the following commands to proceed.
205209
206210
```
207211
systemctl stop waagent

0 commit comments

Comments
 (0)