Skip to content

Commit 19a32ed

Browse files
authored
Merge pull request #274174 from ktoliver/248197
[AQ] edit pass: Trusted Signing content (work item 248197/25054)
2 parents fdb9cff + da77d7e commit 19a32ed

27 files changed

+898
-781
lines changed

articles/trusted-signing/TOC.yml

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -6,35 +6,35 @@
66
items:
77
- name: What is the Trusted Signing service?
88
href: overview.md
9-
- name: How-To
9+
- name: Quickstarts
1010
items:
11-
- name: Signing Integrations with Trusted Signing
11+
- name: Set up Trusted Signing
12+
href: quickstart.md
13+
- name: How-to guides
14+
items:
15+
- name: Set up signing integrations to use Trusted Signing
1216
href: how-to-signing-integrations.md
13-
- name: Sign CI Policies with Trusted Signing
17+
- name: Sign a CI policy by using Trusted Signing
1418
href: how-to-sign-ci-policy.md
1519
- name: Access signed transactions in Trusted Signing
1620
href: how-to-sign-history.md
1721
- name: Revoke a certificate profile in Trusted Signing
1822
href: how-to-cert-revocation.md
19-
- name: Renew Trusted Signing Identity Validation
23+
- name: Renew Trusted Signing identity validation
2024
href: how-to-renew-identity-validation.md
21-
- name: Quickstart
25+
- name: Tutorials
2226
items:
23-
- name: Quickstart onboarding
24-
href: quickstart.md
25-
- name: Tutorial
26-
items:
27-
- name: Assigning Roles in Trusted Signing
27+
- name: Assign roles in Trusted Signing
2828
href: tutorial-assign-roles.md
29-
- name: FAQ
30-
items:
31-
- name: FAQ about Trusted Signing
32-
href: faq.yml
33-
- name: Concept
29+
- name: Concepts
3430
items:
3531
- name: Trusted Signing trust models
3632
href: concept-trusted-signing-trust-models.md
3733
- name: Trusted Signing resources and roles
3834
href: concept-trusted-signing-resources-roles.md
3935
- name: Trusted Signing certificate management
40-
href: concept-trusted-signing-cert-management.md
36+
href: concept-trusted-signing-cert-management.md
37+
- name: FAQ
38+
items:
39+
- name: Frequently asked questions about Trusted Signing
40+
href: faq.yml

articles/trusted-signing/concept-trusted-signing-cert-management.md

Lines changed: 38 additions & 31 deletions
Large diffs are not rendered by default.

articles/trusted-signing/concept-trusted-signing-resources-roles.md

Lines changed: 35 additions & 38 deletions
Large diffs are not rendered by default.
Lines changed: 27 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Trusted Signing trust models
3-
description: Trusted Signing is a fully managed end-to-end service for signing. Managed as an Azure resource, the service functions through the familiar tenant and subscription management experiences. In this article, learn what a trust model is, the two primary trust models provided in Trusted Signing (Public-Trust and Private-Trust), and the signing scenarios and security features that each of the Trusted Signing trust models support.
3+
description: Learn what a trust model is, understand the two primary trust models in Trusted Signing, and learn about the signing scenarios and security features that each supports.
44
author: ianjmcm
55
ms.author: ianmcm
66
ms.service: trusted-signing
@@ -11,48 +11,49 @@ ms.custom: template-concept
1111

1212
# Trusted Signing trust models
1313

14-
This article explains the concept of trust models, the primary trust models that Trusted Signing provides, and how to leverage them across a wide variety of signing scenarios supported by Trusted Signing.
14+
This article explains the concept of trust models, the primary trust models that Trusted Signing provides, and how to use them in a wide variety of signing scenarios that Trusted Signing supports.
1515

16-
## Overview
16+
## Trust models
1717

18-
A trust model defines the rules and mechanisms for validating digital signatures and ensuring the security of communications in a digital environment. In other words, trust models define how trust is established and maintained within entities in a digital ecosystem.
18+
A trust model defines the rules and mechanisms for validating digital signatures and ensuring the security of communications in a digital environment. Trust models define how trust is established and maintained within entities in a digital ecosystem.
1919

20-
For signature consumers like publicly trusted code signing for Microsoft Windows applications, trust models depend on signatures that have certificates from a Certification Authority (CA) that is part of the [Microsoft Root Certificate Program](/security/trusted-root/program-requirements). This is primarily why Trusted Signing trust models are designed to support Windows Authenticode signing and security features that use code signing on Windows (e.g. [Smart App Control](/windows/apps/develop/smart-app-control/overview) and [Windows Defender Application Control](/windows/security/application-security/application-control/windows-defender-application-control/wdac)).
20+
For signature consumers like publicly trusted code signing for Microsoft Windows applications, trust models depend on signatures that have certificates from a Certification Authority (CA) that is part of the [Microsoft Root Certificate Program](/security/trusted-root/program-requirements). For this reason, Trusted Signing trust models are designed primarily to support Windows Authenticode signing and security features that use code signing on Windows (for example, [Smart App Control](/windows/apps/develop/smart-app-control/overview) and [Windows Defender Application Control](/windows/security/application-security/application-control/windows-defender-application-control/wdac)).
2121

22-
Trusted Signing provides two primary trust models to support a wide variety of signature consumption (validations):
22+
Trusted Signing provides two primary trust models to support a wide variety of signature consumption (*validations*):
2323

24-
- [Public-Trust](#public-trust)
25-
- [Private-Trust](#private-trust)
24+
- [Public Trust](#public-trust-model)
25+
- [Private Trust](#private-trust-model)
2626

2727
> [!NOTE]
28-
> Subscribers to Trusted Signing aren't limited to the signing scenarios application of the trust models shared in this article. Trusted Signing was designed to support Windows > Authenticode code signing and App Control for Business features in Windows with an ability to broadly support other signing and trust models beyond Windows.
28+
> You aren't limited to applying the trust models that are used in the signing scenarios described in this article. Trusted Signing was designed to support Windows and Authenticode code signing and Application Control for Windows features. It broadly supports other signing and trust models beyond Windows.
2929
30-
## Public-Trust
30+
## Public Trust model
3131

32-
Public-Trust is one of the models provided in Trusted Signing and is the most commonly used model. The certificates in the Public-Trust model are issued from the [Microsoft Identity Verification Root Certificate Authority 2020](https://www.microsoft.com/pkiops/certs/microsoft%20identity%20verification%20root%20certificate%20authority%202020.crt) and complies with the [Microsoft PKI Services Third Party Certification Practice Statement (CPS)](https://www.microsoft.com/pkiops/docs/repository.htm). This root CA is included a relying party's root certificate program such as the [Microsoft Root Certificate Program](/security/trusted-root/program-requirements) for the usage of code signing and timestamping.
32+
Public Trust is one of the two trust models that are provided in Trusted Signing and is the most commonly used model. The certificates in the Public Trust model are issued from the [Microsoft Identity Verification Root Certificate Authority 2020](https://www.microsoft.com/pkiops/certs/microsoft%20identity%20verification%20root%20certificate%20authority%202020.crt) and comply with the [Microsoft PKI Services Third-Party Certification Practice Statement (CPS)](https://www.microsoft.com/pkiops/docs/repository.htm). This root CA is included in a relying party's root certificate program, such as the [Microsoft Root Certificate Program](/security/trusted-root/program-requirements), for code signing and time stamping.
3333

34-
The Public-Trust resources in Trusted Signing are designed to support the following signing scenarios and security features:
34+
Public Trust resources in Trusted Signing are designed to support the following signing scenarios and security features:
3535

36-
- [Win32 App Code Signing](/windows/win32/seccrypto/cryptography-tools#introduction-to-code-signing)
37-
- [Windows 11 Smart App Control](/windows/apps/develop/smart-app-control/code-signing-for-smart-app-control)
38-
- [/INTEGRITYCHECK - Forced Integrity Signing for PE binaries](/cpp/build/reference/integritycheck-require-signature-check)
39-
- [Virtualization Based Security (VBS) Enclaves](/windows/win32/trusted-execution/vbs-enclaves)
36+
- [Win32 app code signing](/windows/win32/seccrypto/cryptography-tools#introduction-to-code-signing)
37+
- [Smart App Control in Windows 11](/windows/apps/develop/smart-app-control/code-signing-for-smart-app-control)
38+
- [/INTEGRITYCHECK forced integrity signing for portable executable (PE) binaries](/cpp/build/reference/integritycheck-require-signature-check)
39+
- [Virtualization-based security (VBS) enclaves](/windows/win32/trusted-execution/vbs-enclaves)
4040

41-
Public-Trust is recommended for signing any artifact that is to be shared publicly and for the signer to be a validated legal organization or individual.
41+
We recommend that you use Public Trust to sign any artifact that you want to share publicly. The signer should be a validated legal organization or individual.
4242

4343
> [!NOTE]
44-
> Trusted Signing includes options for "Test" Certificate Profiles under the Public-Trust collection, but the certificates are not publicly trusted. These "Test" Certificate Profiles are intended to be used for inner loop dev/test signing and should NOT be trusted.
44+
> Trusted Signing includes options for "test" certificate profiles under the Public Trust collection, but the certificates are not publicly trusted. The Public Trust Test certificate profiles are intended to be used for inner-loop dev/test signing and should *not* be trusted.
4545
46-
## Private-Trust
46+
## Private Trust model
4747

48-
Private-Trust is the other trust model provided in Trusted Signing. It's for opt-in trust where the signatures aren't broadly trusted across the ecosystem. The CA hierarchy used for Trusted Signing's Private-Trust resources isn't default trusted in any root program and in Windows. Rather, it's specifically designed for use in [App Control for Windows (formerly known as Windows Defender Application Control)](/windows/security/application-security/application-control/windows-defender-application-control/wdac) features including:
48+
Private Trust is the second trust model that's provided in Trusted Signing. It's for opt-in trust when signatures aren't broadly trusted across the ecosystem. The CA hierarchy that's used for Trusted Signing Private Trust resources isn't default-trusted in any root program and in Windows. Rather, it's designed to use in [App Control for Business (formerly Windows Defender Application Control, *WDAC*)](/windows/security/application-security/application-control/windows-defender-application-control/wdac) features, including:
4949

50+
- [Use code signing for added control and protection with WDAC](/windows/security/application-security/application-control/windows-defender-application-control/deployment/use-code-signing-for-better-control-and-protection)
51+
- [Use signed policies to protect Windows Defender Application Control against tampering](/windows/security/application-security/application-control/windows-defender-application-control/deployment/use-signed-policies-to-protect-wdac-against-tampering)
52+
- [Optional: Create a code signing cert for Windows Defender Application Control](/windows/security/application-security/application-control/windows-defender-application-control/deployment/create-code-signing-cert-for-wdac)
5053

51-
* [Use code signing for added control and protection with WDAC](/windows/security/application-security/application-control/windows-defender-application-control/deployment/use-code-signing-for-better-control-and-protection)
52-
* [Use signed policies to protect Windows Defender Application Control against tampering](/windows/security/application-security/application-control/windows-defender-application-control/deployment/use-signed-policies-to-protect-wdac-against-tampering)
53-
* [Optional: Create a code signing cert for Windows Defender Application Control](/windows/security/application-security/application-control/windows-defender-application-control/deployment/create-code-signing-cert-for-wdac)
54+
For more information about how to configure and sign WDAC policies by using a Trusted Signing reference, see the [Trusted Signing quickstart](./quickstart.md).
5455

55-
For more information on how to configure and sign WDAC Policy with Trusted Signing reference, [Quickstart Guide](./quickstart.md)
56+
## Next step
5657

57-
## Next steps
58-
* Get started with Trusted Signing's [Quickstart Guide](./quickstart.md)
58+
>[!div class="nextstepaction"]
59+
>[Set up Trusted Signing](./quickstart.md)

0 commit comments

Comments
 (0)