Skip to content

Commit 2e46e2a

Browse files
authored
Remove preview label from container-registry-tutorial-sign-trusted-ca.md
1 parent 7ac32a4 commit 2e46e2a

File tree

1 file changed

+2
-5
lines changed

1 file changed

+2
-5
lines changed

articles/container-registry/container-registry-tutorial-sign-trusted-ca.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Sign container images with Notation and Azure Key vault using a CA-issued certificate (Preview)
2+
title: Sign container images with Notation and Azure Key vault using a CA-issued certificate
33
description: In this tutorial learn to create a CA-issued certificate in Azure Key Vault, build and sign a container image stored in Azure Container Registry (ACR) with notation and AKV, and then verify the container image using notation.
44
author: yizha1
55
ms.author: yizha1
@@ -9,7 +9,7 @@ ms.topic: how-to
99
ms.date: 10/31/2023
1010
---
1111

12-
# Sign container images with Notation and Azure Key Vault using a CA-issued certificate (Preview)
12+
# Sign container images with Notation and Azure Key Vault using a CA-issued certificate
1313

1414
Signing and verifying container images with a certificate issued by a trusted Certificate Authority (CA) is a valuable security practice. This security measure will help you to responsibly identify, authorize, and validate the identity of both the publisher of the container image and the container image itself. The Trusted Certificate Authorities (CAs) such as GlobalSign, DigiCert, and others play a crucial role in the validation of a user's or organization's identity, maintaining the security of digital certificates, and revoking the certificate immediately upon any risk or misuse.
1515

@@ -22,9 +22,6 @@ Here are some essential components that help you to sign and verify container im
2222

2323
When you verify the image, the signature is used to validate the integrity of the image and the identity of the signer. This helps to ensure that the container images are not tampered with and are from a trusted source.
2424

25-
> [!IMPORTANT]
26-
> This feature is currently in preview. Previews are made available to you on the condition that you agree to the [supplemental terms of use][terms-of-use]. Some aspects of this feature may change prior to general availability (GA).
27-
2825
In this article:
2926

3027
> [!div class="checklist"]

0 commit comments

Comments
 (0)