Skip to content

Commit 7f8c714

Browse files
authored
Add section of timestamping
1 parent 0c0d10a commit 7f8c714

File tree

1 file changed

+5
-0
lines changed

1 file changed

+5
-0
lines changed

articles/container-registry/container-registry-tutorial-sign-build-push.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@ In this tutorial:
2121
> * Build and push a container image with [ACR Tasks](container-registry-tasks-overview.md)
2222
> * Sign a container image with Notation CLI and AKV plugin
2323
> * Validate a container image against the signature with Notation CLI
24+
> * Timestamping
2425
2526
## Prerequisites
2627

@@ -343,6 +344,10 @@ To verify the container image, add the root certificate that signs the leaf cert
343344
344345
Upon successful verification of the image using the trust policy, the sha256 digest of the verified image is returned in a successful output message.
345346
347+
## Timestamping
348+
349+
Since Notation v1.2.0 release, Notation supports [RFC 3161](https://www.rfc-editor.org/rfc/rfc3161) compliant timestamping. This enhancement extends the trust of signatures created within certificates validity, enabling successful signature verification even after certificates have expired. Timestamping reduces costs by eliminating the need to periodically re-sign images due to certificate expiry, which is especially critical when using short-lived certificates. For detailed instructions on how to sign and verify using timestamping, please refer to the [Notary Project timestamping guide](https://notaryproject.dev/docs/user-guides/how-to/timestamping/).
350+
346351
## Next steps
347352
348353
Notation also provides CI/CD solutions on Azure Pipeline and GitHub Actions Workflow:

0 commit comments

Comments
 (0)