Skip to content

Commit ecfee2b

Browse files
authored
Add a section for timestamping
1 parent 7f8c714 commit ecfee2b

File tree

1 file changed

+5
-0
lines changed

1 file changed

+5
-0
lines changed

articles/container-registry/container-registry-tutorial-sign-trusted-ca.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,7 @@ In this article:
3030
> * Build and push a container image with ACR task
3131
> * Sign a container image with Notation CLI and AKV plugin
3232
> * Verify a container image signature with Notation CLI
33+
> * Timestamping
3334
3435
## Prerequisites
3536

@@ -392,6 +393,10 @@ To learn more about assigning policy to a principal, see [Assign Access Policy](
392393
393394
If the certificate is revoked, it invalidates the signature. The most common reason for revoking a certificate is when the certificate’s private key has been compromised. To resolve this issue, you should obtain a new certificate from a trusted CA vendor and sign container images again.
394395
396+
## Timestamping
397+
398+
Since Notation v1.2.0 release, Notation supports [RFC 3161](https://www.rfc-editor.org/rfc/rfc3161) compliant timestamping. This enhancement extends the trust of signatures created within certificates validity, enabling successful signature verification even after certificates have expired. Timestamping reduces costs by eliminating the need to periodically re-sign images due to certificate expiry, which is especially critical when using short-lived certificates. For detailed instructions on how to sign and verify using timestamping, please refer to the [Notary Project timestamping guide](https://notaryproject.dev/docs/user-guides/how-to/timestamping/).
399+
395400
## Next steps
396401
397402
Notation also provides CI/CD solutions on Azure Pipeline and GitHub Actions Workflow:

0 commit comments

Comments
 (0)