You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: Trusted Signing is a fully managed end-to-end service for signing. Managed as an Azure resource, the service functions through the familiar tenant and subscription management experiences. In this article, learn what a trust model is, the two primary trust models provided in Trusted Signing (Public-Trust and Private-Trust), and the signing scenarios and security features that each of the Trusted Signing trust models support.
3
+
description: Learn what a trust model is, understand the two primary trust models in Trusted Signing, and learn about the signing scenarios and security features that each supports.
4
4
author: ianjmcm
5
5
ms.author: ianmcm
6
6
ms.service: trusted-signing
@@ -11,48 +11,49 @@ ms.custom: template-concept
11
11
12
12
# Trusted Signing trust models
13
13
14
-
This article explains the concept of trust models, the primary trust models that Trusted Signing provides, and how to leverage them across a wide variety of signing scenarios supported by Trusted Signing.
14
+
This article explains the concept of trust models, the primary trust models that Trusted Signing provides, and how to use them in a wide variety of signing scenarios that Trusted Signing supports.
15
15
16
-
## Overview
16
+
## Trust models
17
17
18
-
A trust model defines the rules and mechanisms for validating digital signatures and ensuring the security of communications in a digital environment. In other words, trust models define how trust is established and maintained within entities in a digital ecosystem.
18
+
A trust model defines the rules and mechanisms for validating digital signatures and ensuring the security of communications in a digital environment. Trust models define how trust is established and maintained within entities in a digital ecosystem.
19
19
20
-
For signature consumers like publicly trusted code signing for Microsoft Windows applications, trust models depend on signatures that have certificates from a Certification Authority (CA) that is part of the [Microsoft Root Certificate Program](/security/trusted-root/program-requirements). This is primarily why Trusted Signing trust models are designed to support Windows Authenticode signing and security features that use code signing on Windows (e.g.[Smart App Control](/windows/apps/develop/smart-app-control/overview) and [Windows Defender Application Control](/windows/security/application-security/application-control/windows-defender-application-control/wdac)).
20
+
For signature consumers like publicly trusted code signing for Microsoft Windows applications, trust models depend on signatures that have certificates from a Certification Authority (CA) that is part of the [Microsoft Root Certificate Program](/security/trusted-root/program-requirements). For this reason, Trusted Signing trust models are designed primarily to support Windows Authenticode signing and security features that use code signing on Windows (for example,[Smart App Control](/windows/apps/develop/smart-app-control/overview) and [Windows Defender Application Control](/windows/security/application-security/application-control/windows-defender-application-control/wdac)).
21
21
22
-
Trusted Signing provides two primary trust models to support a wide variety of signature consumption (validations):
22
+
Trusted Signing provides two primary trust models to support a wide variety of signature consumption (*validations*):
23
23
24
-
-[Public-Trust](#public-trust)
25
-
-[Private-Trust](#private-trust)
24
+
-[PublicTrust](#public-trust-model)
25
+
-[PrivateTrust](#private-trust-model)
26
26
27
27
> [!NOTE]
28
-
> Subscribers to Trusted Signing aren't limited to the signing scenarios application of the trust models shared in this article. Trusted Signing was designed to support Windows > Authenticode code signing and App Control for Business features in Windows with an ability to broadly support other signing and trust models beyond Windows.
28
+
> You aren't limited to applying the trust models that are used in the signing scenarios described in this article. Trusted Signing was designed to support Windows and Authenticode code signing and Application Control for Windows features. It broadly supports other signing and trust models beyond Windows.
29
29
30
-
## Public-Trust
30
+
## PublicTrust model
31
31
32
-
Public-Trust is one of the models provided in Trusted Signing and is the most commonly used model. The certificates in the Public-Trust model are issued from the [Microsoft Identity Verification Root Certificate Authority 2020](https://www.microsoft.com/pkiops/certs/microsoft%20identity%20verification%20root%20certificate%20authority%202020.crt) and complies with the [Microsoft PKI Services ThirdParty Certification Practice Statement (CPS)](https://www.microsoft.com/pkiops/docs/repository.htm). This root CA is included a relying party's root certificate program such as the [Microsoft Root Certificate Program](/security/trusted-root/program-requirements) for the usage of code signing and timestamping.
32
+
PublicTrust is one of the two trust models that are provided in Trusted Signing and is the most commonly used model. The certificates in the PublicTrust model are issued from the [Microsoft Identity Verification Root Certificate Authority 2020](https://www.microsoft.com/pkiops/certs/microsoft%20identity%20verification%20root%20certificate%20authority%202020.crt) and comply with the [Microsoft PKI Services Third-Party Certification Practice Statement (CPS)](https://www.microsoft.com/pkiops/docs/repository.htm). This root CA is included in a relying party's root certificate program, such as the [Microsoft Root Certificate Program](/security/trusted-root/program-requirements), for code signing and time stamping.
33
33
34
-
The Public-Trust resources in Trusted Signing are designed to support the following signing scenarios and security features:
34
+
PublicTrust resources in Trusted Signing are designed to support the following signing scenarios and security features:
Public-Trust is recommended for signing any artifact that is to be shared publicly and for the signer to be a validated legal organization or individual.
41
+
We recommend that you use Public Trust to sign any artifact that you want to share publicly. The signer should be a validated legal organization or individual.
42
42
43
43
> [!NOTE]
44
-
> Trusted Signing includes options for "Test" Certificate Profiles under the Public-Trust collection, but the certificates are not publicly trusted. These "Test" Certificate Profiles are intended to be used for innerloop dev/test signing and should NOT be trusted.
44
+
> Trusted Signing includes options for "test" certificate profiles under the PublicTrust collection, but the certificates are not publicly trusted. The Public Trust Test certificate profiles are intended to be used for inner-loop dev/test signing and should *not* be trusted.
45
45
46
-
## Private-Trust
46
+
## PrivateTrust model
47
47
48
-
Private-Trust is the other trust model provided in Trusted Signing. It's for opt-in trust where the signatures aren't broadly trusted across the ecosystem. The CA hierarchy used for Trusted Signing's Private-Trust resources isn't defaulttrusted in any root program and in Windows. Rather, it's specifically designed for use in [App Control for Windows (formerly known as Windows Defender Application Control)](/windows/security/application-security/application-control/windows-defender-application-control/wdac) features including:
48
+
PrivateTrust is the second trust model that's provided in Trusted Signing. It's for opt-in trust when signatures aren't broadly trusted across the ecosystem. The CA hierarchy that's used for Trusted Signing PrivateTrust resources isn't default-trusted in any root program and in Windows. Rather, it's designed to use in [App Control for Business (formerly Windows Defender Application Control, *WDAC*)](/windows/security/application-security/application-control/windows-defender-application-control/wdac) features, including:
49
49
50
+
-[Use code signing for added control and protection with WDAC](/windows/security/application-security/application-control/windows-defender-application-control/deployment/use-code-signing-for-better-control-and-protection)
51
+
-[Use signed policies to protect Windows Defender Application Control against tampering](/windows/security/application-security/application-control/windows-defender-application-control/deployment/use-signed-policies-to-protect-wdac-against-tampering)
52
+
-[Optional: Create a code signing cert for Windows Defender Application Control](/windows/security/application-security/application-control/windows-defender-application-control/deployment/create-code-signing-cert-for-wdac)
50
53
51
-
*[Use code signing for added control and protection with WDAC](/windows/security/application-security/application-control/windows-defender-application-control/deployment/use-code-signing-for-better-control-and-protection)
52
-
*[Use signed policies to protect Windows Defender Application Control against tampering](/windows/security/application-security/application-control/windows-defender-application-control/deployment/use-signed-policies-to-protect-wdac-against-tampering)
53
-
*[Optional: Create a code signing cert for Windows Defender Application Control](/windows/security/application-security/application-control/windows-defender-application-control/deployment/create-code-signing-cert-for-wdac)
54
+
For more information about how to configure and sign WDAC policies by using a Trusted Signing reference, see the [Trusted Signing quickstart](./quickstart.md).
54
55
55
-
For more information on how to configure and sign WDAC Policy with Trusted Signing reference, [Quickstart Guide](./quickstart.md)
56
+
## Next step
56
57
57
-
## Next steps
58
-
* Get started with Trusted Signing's [Quickstart Guide](./quickstart.md)
0 commit comments