Skip to content

Commit e298289

Browse files
committed
Change links from verify to inspect
1 parent b756820 commit e298289

File tree

4 files changed

+6
-6
lines changed

4 files changed

+6
-6
lines changed

docs/getting-started/faqs.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Notable implementations using blockchain:
3535

3636
### Are Content Credentials about digital rights management?
3737

38-
No; Content Credentials do not enforce permissions for access to content. In many cases, the name displayed by validator products such as the [**Inspect tool on Adobe Content Authenticity (Beta)**](https://verify.contentauthenticity.org) (ACA Inpsect) is the name of the exporter of the content, not the rights owner.
38+
No; Content Credentials do not enforce permissions for access to content. In many cases, the name displayed by validator products such as the [**Inspect tool on Adobe Content Authenticity (Beta)**](https://inspect.cr) (ACA Inpsect) is the name of the exporter of the content, not the rights owner.
3939

4040
The [Title and signing information](aca-inspect.mdx#title-and-signing-information) in ACA Inspect refers to the name of the exporter. If the image was created with an Adobe Product such as Photoshop with Content Credentials (Beta) enabled, the "Produced by" section shows the name of the Adobe ID associated with the user who exported the image.
4141

docs/signing/get-cert.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ A CSR is just an unsigned certificate that's a template for the certificate that
4848
A CSR comprises a public key, as well as ["distinguished name" information](https://knowledge.digicert.com/general-information/what-is-a-distinguished-name) that identifies the individual or organization requesting the certificate. The distinguished name includes a common name, organization, city, state, country, and e-mail address. Not all of these fields are required and will vary depending with the assurance level of the desired certificate.
4949

5050
:::tip
51-
For the [Inspect tool on Adobe Content Authenticity (Beta)](https://verify.contentauthenticity.org) to display your organization name in the Content Credentials, your CSR must include the "O" or Organization Name attribute in the distinguished name information.
51+
For the [Inspect tool on Adobe Content Authenticity (Beta)](https://inspect.cr) to display your organization name in the Content Credentials, your CSR must include the "O" or Organization Name attribute in the distinguished name information.
5252
:::
5353

5454
You sign the CSR with your private key; this proves to the CA that you have control of the private key that corresponds to the public key included in the CSR. Once the requested information in a CSR passes a vetting process and domain control is established, the CA may sign the public key to indicate that it can be publicly trusted.
@@ -74,7 +74,7 @@ You must select at least one of the extended key usage (EKU) fields that specify
7474

7575
### Organization name
7676

77-
If you want the [Inspect tool on Adobe Content Authenticity (Beta)](https://verify.contentauthenticity.org) to display your organization name in the Content Credentials, your certificate must include the "O" or [Organization Name attribute](https://www.alvestrand.no/objectid/2.5.4.10.html) (OID value 2.5.4.10) in the distinguished name information. The CA may require some validation steps to prove you are part of that organization (details vary by CA).
77+
If you want the [Inspect tool on Adobe Content Authenticity (Beta)](https://inspect.cr) to display your organization name in the Content Credentials, your certificate must include the "O" or [Organization Name attribute](https://www.alvestrand.no/objectid/2.5.4.10.html) (OID value 2.5.4.10) in the distinguished name information. The CA may require some validation steps to prove you are part of that organization (details vary by CA).
7878

7979
### Signature types
8080

docs/signing/local-signing.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Accessing a private key and certificate directly from the file system is fine du
2626
Here is an example of getting signing credentials using [GlobalSign](http://globalsign.com/) certificate authority (CA) and then using them with C2PA Tool. GlobalSign is just one of many CAs. For a list of some others, see [Getting a security certificate](get-cert.md#certificate-authorities-cas).
2727

2828
:::note
29-
This example uses an inexpensive personal certificate, which is fine for development and testing, but in production, an enterprise certificate is strongly recommended. An enterprise certificate is required for [Inspect tool on Adobe Content Authenticity (Beta)](https://verify.contentauthenticity.org) to display your organization name when for signed assets.
29+
This example uses an inexpensive personal certificate, which is fine for development and testing, but in production, an enterprise certificate is strongly recommended. An enterprise certificate is required for [Inspect tool on Adobe Content Authenticity (Beta)](https://inspect.cr) to display your organization name when for signed assets.
3030
:::
3131

3232
### 1. Purchase credentials
@@ -157,5 +157,5 @@ This command displays the manifest attached to `signed_image.jpg` and should inc
157157
```
158158

159159
:::info
160-
You can also use the [Inspect tool on Adobe Content Authenticity (Beta)](https://verify.contentauthenticity.org) to confirm that your image was signed, but if you used a personal certificate (not an organization certificate) then it won't show [the organization name](get-cert.md#organization-name) and if your certificate is not on the [known certificate list](../getting-started/trust-list.mdx), it [displays the message](../getting-started/aca-inspect.mdx#title-and-signing-information) "The Content Credential issuer couldn't be recognized...."
160+
You can also use the [Inspect tool on Adobe Content Authenticity (Beta)](https://inspect.cr) to confirm that your image was signed, but if you used a personal certificate (not an organization certificate) then it won't show [the organization name](get-cert.md#organization-name) and if your certificate is not on the [known certificate list](../getting-started/trust-list.mdx), it [displays the message](../getting-started/aca-inspect.mdx#title-and-signing-information) "The Content Credential issuer couldn't be recognized...."
161161
:::

docs/signing/test-certs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,6 @@ While these test credentials are useful during development, you must [get your o
1515

1616
Although not recommended due to complexity and difficulty, you can create your own certificates for development and testing. Follow the requirements in the C2PA Technical Specification [X.509 Certificates](https://c2pa.org/specifications/specifications/2.1/specs/C2PA_Specification.html#x509_certificates) and [Digital Signatures](https://c2pa.org/specifications/specifications/2.1/specs/C2PA_Specification.html#_digital_signatures) sections.
1717

18-
For manifest claims signed with one of the test certificates, the [Inspect tool on Adobe Content Authenticity (Beta)](https://verify.contentauthenticity.org) will display the message "The Content Credential issuer couldn't be recognized." See [Using ACA Inspect](../getting-started/aca-inspect.mdx#signing-information) for more information.
18+
For manifest claims signed with one of the test certificates, the [Inspect tool on Adobe Content Authenticity (Beta)](https://inspect.cr) will display the message "The Content Credential issuer couldn't be recognized." See [Using ACA Inspect](../getting-started/aca-inspect.mdx#signing-information) for more information.
1919

2020

0 commit comments

Comments
 (0)