Skip to main content

Assumptions

The monitoring protocol makes the following assumptions:

  1. Every enclave exposes an endpoint through a secure channel on which Auditors can make requests without the host being able to determine whether the request is coming from an Auditor or a User.
  2. Oyster enclave images use a standard wrapper over the intended application which exposes a HTTPS server and acts as a gateway to the application.
  3. All HTTPS communications happen through a single port.
  4. Similarly, all communications using other protocols like wss happen through gateways which have default endpoints that can be accessed by Auditors.