Skip to content

Commit a99eafb

Browse files
authored
Merge pull request #274229 from mehasharma/faq-updates
Faq updates
2 parents a012b7b + 2abf441 commit a99eafb

File tree

6 files changed

+33
-15
lines changed

6 files changed

+33
-15
lines changed
153 KB
Loading
64.7 KB
Loading

articles/trusted-signing/faq.yml

Lines changed: 16 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -35,10 +35,14 @@ sections:
3535
Register the Microsoft.CodeSigning app in the subscription resource provider page using the below screenshot as a guide: :::image type="content" source="media/trusted-signing-resource-provider.png" alt-text="Screenshot of registering Microsoft.CodeSigning resource provider." lightbox="media/trusted-signing-resource-provider.png":::
3636
- question: What if I fail identity validation?
3737
answer: |
38-
If more documentation is required for identity validation, you're asked to provide those documents on the Azure portal. Otherwise, we recommend checking for an email sent to the listed address for email validation. However, if your organization fails identity validation we can't onboard you to Trusted Signing. We recommend you delete your Trusted Signing account so you don't get billed for unused resources.
38+
To identify why the Identity Validation failed:
39+
- We recommend you check if you failed to verify the link within seven days of receiving the link. This link is sent to the primary email address provided at the time of Identity Validation request creation.
40+
OR
41+
- If the validation team is unable to make a determination based on the information provided (even after extra documentation is provided), we can't onboard you to Trusted Signing.
42+
We recommend you delete your Trusted Signing account so you don't get billed for unused resources.
3943
- question: What is the cost of using Trusted Signing?
4044
answer: |
41-
For Public Preview Trusted Signing is free for now. You'll still be prompted to select a Basic or Premium SKU when you create your account.
45+
For Public Preview Trusted Signing is free for now. You are prompted to select a Basic or Premium SKU when you create your account.
4246
- question: What are my support options when onboarding to Trusted Signing?
4347
answer: |
4448
You can create a support ticket with the service on the Azure portal and be assisted by Azure customer support. Otherwise, we recommend you go to Microsoft Q&A or StackOverflow under the tag Trusted-Signing to ask questions.
@@ -49,23 +53,24 @@ sections:
4953
Follow the persistent identity guidance in the [MSIX Persistent Identity](https://learn.microsoft.com/windows/msix/package/persistent-identity) article.
5054
- question: Does deleting the certificate profile revoke the certificates?
5155
answer: |
52-
No. If you delete a certificate profile, any certificates that were previously issued or used under that profile will remain valid - they won't be revoked.
56+
No. If you delete a certificate profile, any certificates that were previously issued or used under that profile remain valid - they aren't revoked.
5357
- question: Does Trusted Signing allow me to use a custom CN?
5458
answer: |
55-
Per the CA/B Forum baseline requirements for publicly trusted code signing certs, CN values must be the legal entity's validated name (e.g. Microsoft Corporation) so there isn't much flexibility in CN values. However, a `O` value allows for verified legal names, trade names, and DBAs (doing business as). For individuals, there are already requirements for verification of individuals in the baseline requirements that we meet.
59+
- For CN: Per the CA/B Forum baseline requirements for publicly trusted code signing certs, CN values must be the legal entity's validated name (for example, Microsoft Corporation) so there is no flexibility in CN values.
60+
- For O: At, this time Trusted Signing does not support customization.
5661
- question: What do I do if the new identity validation button on the Azure portal is greyed out?
5762
answer: |
58-
This means you do not have the Identity Verifier role assigned to your account. Follow the [Assigning roles in Trusted Signing](https://learn.microsoft.com/azure/trusted-signing/tutorial-assign-roles) documentation to assign yourself the appropriate role.
63+
This means you don't have the Trusted Signing Identity Verifier role assigned to your account. Follow the [Assigning roles in Trusted Signing](https://learn.microsoft.com/azure/trusted-signing/tutorial-assign-roles) documentation and assign yourself the appropriate role.
5964
- name: Signing
6065
questions:
6166
- question: What is Trusted Signing’s HSM compliance level?
6267
answer: |
6368
FIPS 140-2 level 3 (mHSMs)
6469
- question: How to include the appropriate EKU for our certificates into the ELAM driver resources?
6570
answer: |
66-
- For information regarding ELAM driver config for Protected Anti-Malware Services, refer to the following guidance: "Beginning in 2022, all user mode anti-malware service binaries must be signed by Microsoft's Trusted Signing signing service. The Trusted Signing issued Authenticode certificate for signing anti-malware binaries is updated every 30 days for security. To prevent the need to update the ELAM driver every time the certificate is updated, we recommend that anti-malware vendors include the Trusted Signing PCA certificate TBS hash in the CertHash portion of the ELAM driver resource file info. Additionally, the anti-malware vendor must include their unique Trusted Signing EKU identity in the EKU field of the resource file info. The EKU identity will begin with the prefix *1.3.6.1.4.1.311.97.*."
71+
- For information regarding ELAM driver config for Protected Anti-Malware Services, refer to the following guidance: "Beginning in 2022, all user mode anti-malware service binaries must be signed by Microsoft's Trusted Signing signing service. The Trusted Signing issued Authenticode certificate for signing anti-malware binaries is updated every 30 days for security. To prevent the need to update the ELAM driver every time the certificate is updated, we recommend that anti-malware vendors include the Trusted Signing PCA certificate TBS hash in the CertHash portion of the ELAM driver resource file info. Additionally, the anti-malware vendor must include their unique Trusted Signing EKU identity in the EKU field of the resource file info. The EKU identity begins with the prefix *1.3.6.1.4.1.311.97.*."
6772
- See the [PKI Repository](https://www.microsoft.com/pkiops/docs/repository.htm) page for the Microsoft ID Verified Code Signing PCA 2021 cert.
68-
- question: What happens if we run binaries signed with Trusted Signing on a machine that doesn't have the Trusted Signing update (especially binaries that are INTEGRITYCHECK-ed)?
73+
- question: What happens if we execute binaries signed with Trusted Signing on a machine that doesn't have the Trusted Signing update (especially binaries that are INTEGRITYCHECK-ed)?
6974
answer: |
7075
- If an INTEGRITYCHECK flag is set, the user's signature isn't validated at runtime and isn't run with INTEGRITYCHECK.
7176
- To check if Trusted Signing update is installed or not, we recommend that you check against one of your packaged /IntegrityCheck-linked DLLs. A dummy one works, too. That way you can complete your check independently of the platform and the availability of our IntegrityCheck-linked binaries.
@@ -74,7 +79,7 @@ sections:
7479
We're not extending any cross-signed certificates. , you must sign with the Trusted Signing service.
7580
- question: How is Trusted Signing different than the signing customers do with Partner Center?
7681
answer: |
77-
Signing with the Partner Center is Kernel mode signing (no change here with the introduction of Trusted Signing). You'll need to sign your user mode binaries with Trusted Signing. For your apps that interact with the Windows Security Center (WSC) service, you must include the Code Integrity bit (/INTEGRITYCHECK). Without the Trusted Signing signature, you aren't able to register with the WSC, and Windows Defender will run in parallel.
82+
Signing with the Partner Center is Kernel mode signing (no change here with the introduction of Trusted Signing). You need to sign your user mode binaries with Trusted Signing. For your apps that interact with the Windows Security Center (WSC) service, you must include the Code Integrity bit (/INTEGRITYCHECK). Without the Trusted Signing signature, you aren't able to register with the WSC, and Windows Defender will run in parallel.
7883
- question: How do we get the Authenticode certificate?
7984
answer: |
8085
The Authenticode certificate used for signing with the profile is never given to you. All certificates are securely stored within the service and are only accessible at the time of signing. The public certificate is always included in any signed binary by the service.
@@ -123,6 +128,8 @@ sections:
123128
- question: What if I change the Subscription ID or Tenant ID?
124129
answer: |
125130
At the moment, Trusted Signing resources can't be migrated across Subscriptions or Tenants. Hence, any change to Tenant ID or Subscription ID will need fro you to create all the Trusted Signing resources again.
126-
131+
- question: Does Trusted Signing issue EV certificates?
132+
answer: |
133+
No, Trusted Signing does not issue EV certificates and there are no plans to issue these in the future.
127134
##additionalContent: |
128135
## Next steps
36.5 KB
Loading

articles/trusted-signing/overview.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Trusted Signing (formerly Azure Code Signing) is a Microsoft fully managed end-t
1717
## Features
1818

1919
* Simplifies the signing process with an intuitive experience in Azure
20-
* Zero-touch certificate lifecycle management that is FIPS 140-2 Level 3 compliant.
20+
* Zero-touch certificate lifecycle management that is FIPS 140-2 Level 3 certified HSMs.
2121
* Integrations into leading developer toolsets.
2222
* Supports Public Trust, Test, Private Trust, and CI policy signing scenarios.
2323
* Timestamping service.
@@ -28,11 +28,11 @@ Here’s a high-level overview of the service’s resource structure:
2828

2929
![Diagram of Azure Code Signing resource group and cert profiles.](./media/trusted-signing-resource-structure-overview.png)
3030

31-
* You create a resource group within a subscription. You then create a Trusted Signing account within the resource group.
32-
* Two resources within an account:
33-
* Identity validation
31+
* You create a resource group within a subscription. You then create a Trusted Signing account within that resource group.
32+
* There are two resources within a Trusted Signing account:
33+
* Identity validation
3434
* Certificate profile
35-
* Two types of accounts (depending on the SKU you choose):
35+
* There are two types of Trusted Signing accounts (depending on the SKU(Pricing tier) you choose):
3636
* Basic
3737
* Premium
3838

articles/trusted-signing/quickstart.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -231,7 +231,7 @@ Here are the steps to create an Identity Validation request:
231231
| Onboarding | Trusted Signing at this time can only onboard Legal Business Entities that have verifiable tax history of three or more years. For a quicker onboarding process ensure public records for the Legal Entity being validated are upto date. |
232232
| Accuracy | Ensure you provide the correct information for Public Identity Validation. Any changes or typos require you to complete a new Identity Validation request and affect the associated certificates used for signing.|
233233
| Additional documentation | You are notified though email, if we need extra documentation to process the identity validation request. The documents can be uploaded in Azure portal. The email contains information about the file size requirements. Ensure the documents provided are latest.|
234-
| Failed email verification | You are required to initiate a new Identity Validation request if email verification fails.|
234+
| Failure to perform email verification | You are required to initiate a new Identity Validation request if you missed to verify your emaail address within 7 days of receiving the verification link.|
235235
| Identity Validation status | You are notified through email when there is an update to the Identity Validation status. You can also check the status in the Azure portal at any time. |
236236
| Processing time | Expect anywhere between 1-7 business days (or sometimes longer if we need extra documentation from you) to process your Identity Validation request.|
237237

@@ -270,6 +270,17 @@ A certificate profile resource is the logical container of the certificates that
270270

271271
# [Azure CLI](#tab/certificateprofile-cli)
272272

273+
**Prerequisites**
274+
You need the Identity Validation ID for the entity that the certificate profile is being created for. The below steps will guide you to obtain your Identity Validation ID from Azure Portal.
275+
276+
1. Navigate to your Trusted Signing account in the Azure portal.
277+
2. From either the Trusted Signing account overview page or from Objects, select **Identity Validation**.
278+
3. Select the hyperlink for the relevant entity, from the panel on the right you can copy the **Identity validation Id**.
279+
280+
:::image type="content" source="media/trusted-signing-identity-validation-id.png" alt-text="Screenshot of trusted-signing-identity-validation-id." lightbox="media/trusted-signing-identity-validation-id.png":::
281+
282+
283+
273284
To create a certificate profile with Azure CLI, follow these steps:
274285

275286
1. Create a certificate profile using the following command:

0 commit comments

Comments
 (0)