You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-machines/extensions/agent-linux-fips.md
+9-5Lines changed: 9 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,10 +12,13 @@ ms.date: 09/25/2025
12
12
---
13
13
# FIPS 140-3 support for Azure Linux VM Extensions and Guest Agent
14
14
15
-
[What is the Federal Information Processing Standards (FIPS)](https://www.nist.gov/standardsgov/compliance-faqs-federal-information-processing-standards-fips)
15
+
> [!NOTE]
16
+
> This feature is currently in **Public Preview**, production workloads are supported.
16
17
17
18
Linux Virtual Machine (VM) Extensions currently comply with FIPS 140-2 but updates to the platform were required to add support for FIPS 140-3. These changes are currently being enabled across the Commercial Cloud and Azure Government Clouds. Linux VM Extensions that use protected settings are also being updated to be able to use a FIPS 140-3 compliant encryption algorithm. This document helps enable support for FIPS 140-3 on Linux VMs where compliance with FIPS 140-3 is enforced. This change isn't needed on Windows images due to the way FIPS compliance is implemented.
18
19
20
+
-[What is the Federal Information Processing Standards (FIPS)](https://www.nist.gov/standardsgov/compliance-faqs-federal-information-processing-standards-fips)
21
+
19
22
## Confirmed Supported Extensions
20
23
21
24
- MICROSOFT.AKS.COMPUTE.AKS.LINUX.AKSNODE
@@ -92,6 +95,9 @@ az feature list | jq '.[] | select(.name=="Microsoft.Compute/OptInToFips1403Comp
92
95
93
96
There are different methods available for opting-in each VM. The changes can be made at deployment for a new VM, or an existing VM can be altered to add the FIPS 140-3 enablement on the Azure platform.
94
97
98
+
> [!WARNING]
99
+
> We do not recommend using the below Opt-In methods on RedHat 9.5 and 9.6 using version 2.7.0.6 of WALinuxAgent on production systems. This is due to an issue that will surface after rebooting, after the FIPS enablement and subsequent reboot. In these VMs the `waagent.service` will enter an internal loop and never come to a "Ready" state, and because of this error, no extensions are able to function. For testing you can try the below "RedHat 9 Workaround".
100
+
95
101
#### Deploying a new VM
96
102
97
103
In order to deploy a new VM with FIPS 140-3 enablement turned on immediately, use an ARM Template or CLI and add the `enableFips1403Encryption` property to the `additionalCapabilities` section of the `virtualMachines` object definition
@@ -196,12 +202,10 @@ Minimum [Goal State Agent](https://github.com/Azure/WALinuxAgent/wiki/FAQ#what-d
196
202
AutoUpdate.Enabled=y
197
203
```
198
204
199
-
> [!WARNING]
200
-
> For RedHat 9 versions using version 2.7.0.6 of WALinuxAgent, there's an issue that will surface after rebooting, after the FIPS enablement and subsequent reboot. In these VMs the `waagent.service` will enter an internal loop and never come to a "Ready" state, and because of this error, no extensions are able to function.
201
-
202
205
##### RedHat 9 Workaround
203
206
204
-
Updating the Azure guest agent outside of the RedHat repositories, such as downloading the agent code from GitHub, is not advised. Doing an 'out-of-band' update in this way will cause inconsistent behavior with future package updates. Instead use the following code modification to remove a single function call and restore functionality
207
+
> [!NOTE]
208
+
> This workaround is intended for testing purposes only and does not support all VM deployment scenarios. After enabling FIPS on a running VM, execute the following commands to proceed.
0 commit comments