Skip to content

Commit 20a6df7

Browse files
author
Rand McKinney
committed
Add para about cert chains
1 parent 1164fb6 commit 20a6df7

File tree

2 files changed

+3
-1
lines changed

2 files changed

+3
-1
lines changed

docs/manifest/signing-manifests.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ Although not recommended due to complexity and difficulty, you can create your o
4949

5050
### Signature types
5151

52-
The following table describes the signature algorithms and recommended signature types that the [C2PA Tool](/docs/c2patool) and [Rust library](/docs/rust-sdk) support. You must supply credentials (certificates and keys) that correspond to the signing algorithm. Signing/validation will fail if the the supplied credentials don't support the signature type.
52+
The following table describes the signature algorithms and recommended signature types that the CAI SDK supports. You must supply credentials (certificates and keys) that correspond to the signing algorithm. Signing/validation will fail if the the supplied credentials don't support the signature type.
5353

5454
| Certificate `signatureAlgorithm` | Description | Recommended signature type | RFC Reference |
5555
| -------------------------------- | ------------ | -------------------------- | ------------- |

docs/prod-cert.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,8 @@ When you purchase a certificate, you must select at least one of the extended ke
1717

1818
The process to purchase a certificate and key is different for each CA: You might be able to simply click a "Buy" button on the CA's website. Or your can make your own key, create a certificate signing request (CSR), and send it to CA. Regardless of the process, what you get back is a signed certificate that you use to create a certificate chain.
1919

20+
The certificate chain starts with the certificate from the last tool that signed the manifest (known as the "end-entity") followed by the certificate that signed it, and so on, back to the original CA issuer. This enables a validating application to determine that the manifest is valid because the certificate chain goes back to a trusted root certificate authority.
21+
2022
### Certificate signing requests (CSRs)
2123

2224
A CSR is just an unsigned certificate that's a template for the certificate that you're requesting. The CA create a new certificate with the parameters specified in the CSR, and signs it with their root certificate, which makes it a "real" certificate.

0 commit comments

Comments
 (0)