Skip to content

Commit

Permalink
Clarify client is creating the public private key pair in 'How Sigsto…
Browse files Browse the repository at this point in the history
…re works' section of overview.

Signed-off-by: Sam Pinkus <[email protected]>
  • Loading branch information
sgpinkus committed Jan 23, 2025
1 parent ad31e90 commit aaf4023
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion content/en/about/overview.md
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@ The signer ideally forgoes using long-lived keypairs. With “keyless” or “e

## How Sigstore works

A Sigstore client, such as Cosign, requests a certificate from our code-signing certificate authority (Fulcio). A verifiable OpenID Connect identity token, which contains a user's email address or service account, is provided in the request. The certificate authority verifies this token and issues a short-lived certificate bound to the provided identity.
A Sigstore client, such as Cosign, creates a public/private key pair and makes a certificate signing request to our code-signing certificate authority (Fulcio) with the public key. A verifiable OpenID Connect identity token, which contains a user's email address or service account, is also provided in the request. The certificate authority verifies this token and issues a short-lived certificate bound to the provided identity and public key.

You don’t have to manage signing keys, and Sigstore services never obtain your private key. The public key that a Sigstore client creates gets bound to the issued certificate, and the private key is discarded after a single signing.

Expand Down

0 comments on commit aaf4023

Please sign in to comment.