Overview
The following is a general overview of the process used to verify the integrity of software artifacts using the Cosign keyless signing process.1
Request certificate
The developer requests a certificate from the Fulcio certificate authority. The developer authenticates using Open ID Connect and Fulcio returns the signing key pair.
2
Publish signing certificate
Cosign orchestrates the signing and publishes the public key to the Rekor transparency log.
3
Sign and publish artifact
The developer uses the private keys to sign the artifact, then publishes the signed artifact to end users. The private key is deleted.
4
Verify signature
End users download the signed artifact and verify both aspects:
- Check the signature in the Rekor transparency log using the public keys generated with Cosign (from step 1).
- Check that the signing party is in the trust root.
Signing public and private key pair
Fulcio generates a a key pair that includes:- Private key for signing data. The signing key is private and extremely short-lived so it doesn’t need to be stored.
- Public key for verifying the signature. The verification key is public and openly distributed so anyone can use it to verify the signature.