Skip to content

Commit 74ed0e0

Browse files
authored
Update container-registry-tutorial-sign-trusted-ca.md
1 parent aa51728 commit 74ed0e0

File tree

1 file changed

+14
-6
lines changed

1 file changed

+14
-6
lines changed

articles/container-registry/container-registry-tutorial-sign-trusted-ca.md

Lines changed: 14 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Signing and verifying container images with a certificate issued by a trusted Ce
1515

1616
Here are some essential components that help you to sign and verify container images with a certificate issued by a trusted CA:
1717

18-
* The [Notation](https://github.com/notaryproject/notation) is an open-source supply chain tool developed by [Notary Project](https://notaryproject.dev/), which supports signing and verifying container images and other artifacts.
18+
* The [Notation](https://github.com/notaryproject/notation) is an open-source supply chain security tool developed by [Notary Project community](https://notaryproject.dev/) and backed by Microsoft, which supports signing and verifying container images and other artifacts.
1919
* The Azure Key Vault (AKV), a cloud-based service for managing cryptographic keys, secrets, and certificates will help you ensure to securely store and manage a certificate with a signing key.
2020
* The [Notation AKV plugin azure-kv](https://github.com/Azure/notation-azure-kv), the extension of Notation uses the keys stored in Azure Key Vault for signing and verifying the digital signatures of container images and artifacts.
2121
* The Azure Container Registry (ACR) allows you to attach these signatures to the signed image and helps you to store and manage these container images.
@@ -53,17 +53,17 @@ In this article:
5353
cp ./notation /usr/local/bin
5454
```
5555

56-
2. Install the Notation Azure Key Vault plugin `azure-kv` v1.1.0 on a Linux amd64 environment.
56+
2. Install the Notation Azure Key Vault plugin `azure-kv` v1.2.0 on a Linux amd64 environment.
5757

5858
> [!NOTE]
5959
> The URL and SHA256 checksum for the Notation Azure Key Vault plugin can be found on the plugin's [release page](https://github.com/Azure/notation-azure-kv/releases).
6060
6161
```bash
62-
notation plugin install --url https://github.com/Azure/notation-azure-kv/releases/download/v1.1.0/notation-azure-kv_1.1.0_linux_amd64.tar.gz --sha256sum 2fc959bf850275246b044203609202329d015005574fabbf3e6393345e49b884
62+
notation plugin install --url https://github.com/Azure/notation-azure-kv/releases/download/v1.2.0/notation-azure-kv_1.2.0_linux_amd64.tar.gz --sha256sum 06bb5198af31ce11b08c4557ae4c2cbfb09878dfa6b637b7407ebc2d57b87b34
6363
```
6464
65-
3. List the available plugins and confirm that the `azure-kv` plugin with version `1.1.0` is included in the list.
66-
65+
3. List the available plugins and confirm that the `azure-kv` plugin with version `1.2.0` is included in the list.
66+
6767
```bash
6868
notation plugin ls
6969
```
@@ -394,6 +394,14 @@ To learn more about assigning policy to a principal, see [Assign Access Policy](
394394
395395
## Next steps
396396
397-
See [Use Image Integrity to validate signed images before deploying them to your Azure Kubernetes Service (AKS) clusters (Preview)](/azure/aks/image-integrity?tabs=azure-cli) and [Ratify on Azure](https://ratify.dev/docs/1.0/quickstarts/ratify-on-azure/) to get started into verifying and auditing signed images before deploying them on AKS.
397+
Notation also provides CI/CD solutions on Azure Pipeline and GitHub Actions Workflow:
398+
399+
- [Sign and verify a container image with Notation in Azure Pipeline](/azure/security/container-secure-supply-chain/articles/notation-ado-task-sign)
400+
- [Sign and verify a container image with Notation in GitHub Actions Workflow](https://github.com/marketplace/actions/notation-actions)
401+
402+
To validate signed image deployment in AKS or Kubernetes:
403+
404+
- [Use Image Integrity to validate signed images before deploying them to your Azure Kubernetes Service (AKS) clusters (Preview)](/azure/aks/image-integrity?tabs=azure-cli)
405+
- [Use Ratify to validate and audit image deployment in any Kubernetes cluster](https://ratify.dev/)
398406
399407
[terms-of-use]: https://azure.microsoft.com/support/legal/preview-supplemental-terms/

0 commit comments

Comments
 (0)