Skip to content

Commit 483b2df

Browse files
Merge pull request #286176 from yizha1/main
docs: add a section for timestamping how-to
2 parents fbb23b2 + c2846f7 commit 483b2df

File tree

2 files changed

+11
-1
lines changed

2 files changed

+11
-1
lines changed

articles/container-registry/container-registry-tutorial-sign-build-push.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@ In this tutorial:
2121
> * Build and push a container image with [ACR Tasks](container-registry-tasks-overview.md)
2222
> * Sign a container image with Notation CLI and AKV plugin
2323
> * Validate a container image against the signature with Notation CLI
24+
> * Timestamping
2425
2526
## Prerequisites
2627

@@ -343,6 +344,10 @@ To verify the container image, add the root certificate that signs the leaf cert
343344
344345
Upon successful verification of the image using the trust policy, the sha256 digest of the verified image is returned in a successful output message.
345346
347+
## Timestamping
348+
349+
Since Notation v1.2.0 release, Notation supports [RFC 3161](https://www.rfc-editor.org/rfc/rfc3161) compliant timestamping. This enhancement extends the trust of signatures created within certificates validity, enabling successful signature verification even after certificates have expired. Timestamping reduces costs by eliminating the need to periodically re-sign images due to certificate expiry, which is especially critical when using short-lived certificates. For detailed instructions on how to sign and verify using timestamping, please refer to the [Notary Project timestamping guide](https://v1-2.notaryproject.dev/docs/user-guides/how-to/timestamping/).
350+
346351
## Next steps
347352
348353
Notation also provides CI/CD solutions on Azure Pipeline and GitHub Actions Workflow:

articles/container-registry/container-registry-tutorial-sign-trusted-ca.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: yizha1
66
ms.service: azure-container-registry
77
ms.custom: devx-track-azurecli
88
ms.topic: how-to
9-
ms.date: 10/31/2023
9+
ms.date: 9/5/2024
1010
---
1111

1212
# Sign container images with Notation and Azure Key Vault using a CA-issued certificate
@@ -30,6 +30,7 @@ In this article:
3030
> * Build and push a container image with ACR task
3131
> * Sign a container image with Notation CLI and AKV plugin
3232
> * Verify a container image signature with Notation CLI
33+
> * Timestamping
3334
3435
## Prerequisites
3536

@@ -392,6 +393,10 @@ To learn more about assigning policy to a principal, see [Assign Access Policy](
392393
393394
If the certificate is revoked, it invalidates the signature. The most common reason for revoking a certificate is when the certificate’s private key has been compromised. To resolve this issue, you should obtain a new certificate from a trusted CA vendor and sign container images again.
394395
396+
## Timestamping
397+
398+
Since Notation v1.2.0 release, Notation supports [RFC 3161](https://www.rfc-editor.org/rfc/rfc3161) compliant timestamping. This enhancement extends the trust of signatures created within certificates validity, enabling successful signature verification even after certificates have expired. Timestamping reduces costs by eliminating the need to periodically re-sign images due to certificate expiry, which is especially critical when using short-lived certificates. For detailed instructions on how to sign and verify using timestamping, please refer to the [Notary Project timestamping guide](https://v1-2.notaryproject.dev/docs/user-guides/how-to/timestamping/).
399+
395400
## Next steps
396401
397402
Notation also provides CI/CD solutions on Azure Pipeline and GitHub Actions Workflow:

0 commit comments

Comments
 (0)