You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/trust-list.mdx
+37-3Lines changed: 37 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,13 +26,44 @@ The [contentcredentials.org](https://contentcredentials.org/) site hosts the fol
26
26
-**The temporary known anchor list** in https://contentcredentials.org/trust/anchors.pem contains the list of known anchor certificates. If an end-entity [certificate's chain](getting-started.mdx#signing-and-certificates) can be traced back to an anchor certificate on this list, the certificate is considered "known."
27
27
-**The configuration file**, https://contentcredentials.org/trust/store.cfg, specifies the [Extended Key Usage (EKU)](https://datatracker.ietf.org/doc/html/rfc9336) values accepted for end-entity certificates. An end-entity certificate must have at least one of the EKUs in this list to be valid.
28
28
29
+
## Checking your certificate
30
+
31
+
Perform a preliminary "sanity check" on your certificate before requesting that it be added to the known certificate list.
32
+
33
+
1. Ensure that C2PA Tool can use the certificate and doesn't return any validation errors by using a command like this:
Confirm that the result does not contain a `validation_status` field which indicates an error.
40
+
41
+
1. Confirm that the `signature_info.issuer` field in the manifest is correct. This field determines what Verify displays. In this example, replace "XYZ Inc." with the name of your organization:
You can use the C2PA Tool or the CAI JavaScript library to determine whether a certificate is on the temporary known certificate list.
32
63
33
64
### Using with C2PA Tool
34
65
35
-
The [C2PA Tool documentation](c2patool/readme.md#configuring-trust-support) explains how to use the temporary known certificate list with the tool.
66
+
The [C2PA Tool documentation](c2patool/docs/usage.md#configuring-trust-support) explains how to use the temporary known certificate list with the tool.
36
67
37
68
### Using with the JavaScript library
38
69
@@ -84,6 +115,9 @@ This code is for illustration purposes only. To ensure acceptable performance, p
84
115
85
116
## How to add a certificate to the list
86
117
87
-
If you have an application that is in production and publicly available, you can request to add its signing certificate to the temporary known certificate list: Simply email `[email protected]`.
118
+
If you have an application that is in production and publicly available, you can request to add its signing certificate to the temporary known certificate list.
119
+
120
+
Follow these steps:
88
121
89
-
We will review your request, and if it is approved, we'll ask for more details. Once we receive them and deploy the change, you will receive a confirmation email.
122
+
1.[**Do a preliminary check of your certificate**](#checking-your-certificate) to ensure it meets the requirements for C2PA signing certificates and to be in the Verify temporary certificate list.
123
+
1.**Submit your request** by emailing `[email protected]`. We will review your request, and if it is approved, we'll ask for more details. Once we receive them and deploy the update to the trust list, you will receive a confirmation email.
0 commit comments