Skip to content

Commit aaf1525

Browse files
Merge pull request #310270 from MicrosoftDocs/main
Auto Publish – main to live - 2026-01-08 18:00 UTC
2 parents c547e11 + 7d02d0a commit aaf1525

108 files changed

Lines changed: 2279 additions & 1219 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.json

Lines changed: 80 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -565,6 +565,81 @@
565565
"redirect_url": "/azure/storage/files/create-file-share",
566566
"redirect_document_id": false
567567
},
568+
{
569+
"source_path": "articles/trusted-signing/overview.md",
570+
"redirect_url": "/azure/artifact-signing/overview",
571+
"redirect_document_id": false
572+
},
573+
{
574+
"source_path": "articles/trusted-signing/how-to-sign-ci-policy.md",
575+
"redirect_url": "/azure/artifact-signing/how-to-sign-ci-policy",
576+
"redirect_document_id": false
577+
},
578+
{
579+
"source_path": "articles/trusted-signing/quickstart.md",
580+
"redirect_url": "/azure/artifact-signing/quickstart",
581+
"redirect_document_id": false
582+
},
583+
{
584+
"source_path": "articles/trusted-signing/tutorial-assign-roles.md",
585+
"redirect_url": "/azure/artifact-signing/tutorial-assign-roles",
586+
"redirect_document_id": false
587+
},
588+
{
589+
"source_path": "articles/trusted-signing/how-to-signing-integrations.md",
590+
"redirect_url": "/azure/artifact-signing/how-to-signing-integrations",
591+
"redirect_document_id": false
592+
},
593+
{
594+
"source_path": "articles/trusted-signing/how-to-sign-history.md",
595+
"redirect_url": "/azure/artifact-signing/how-to-sign-history",
596+
"redirect_document_id": false
597+
},
598+
{
599+
"source_path": "articles/trusted-signing/how-to-renew-identity-validation.md",
600+
"redirect_url": "/azure/artifact-signing/how-to-renew-identity-validation",
601+
"redirect_document_id": false
602+
},
603+
{
604+
"source_path": "articles/trusted-signing/how-to-device-guard-signing-service-migration.md",
605+
"redirect_url": "/azure/artifact-signing/how-to-device-guard-signing-service-migration",
606+
"redirect_document_id": false
607+
},
608+
{
609+
"source_path": "articles/trusted-signing/how-to-change-sku.md",
610+
"redirect_url": "/azure/artifact-signing/how-to-change-sku",
611+
"redirect_document_id": false
612+
},
613+
{
614+
"source_path": "articles/trusted-signing/how-to-cert-revocation.md",
615+
"redirect_url": "/azure/artifact-signing/how-to-cert-revocation",
616+
"redirect_document_id": false
617+
},
618+
{
619+
"source_path": "articles/trusted-signing/concept-trust-models.md",
620+
"redirect_url": "/azure/artifact-signing/concept-trust-models",
621+
"redirect_document_id": false
622+
},
623+
{
624+
"source_path": "articles/trusted-signing/concept-resources-roles.md",
625+
"redirect_url": "/azure/artifact-signing/concept-resources-roles",
626+
"redirect_document_id": false
627+
},
628+
{
629+
"source_path": "articles/trusted-signing/concept-cert-management.md",
630+
"redirect_url": "/azure/artifact-signing/concept-certificate-management",
631+
"redirect_document_id": false
632+
},
633+
{
634+
"source_path": "articles/trusted-signing/index.yml",
635+
"redirect_url": "/azure/artifact-signing/index",
636+
"redirect_document_id": false
637+
},
638+
{
639+
"source_path": "articles/trusted-signing/faq.yml",
640+
"redirect_url": "/azure/artifact-signing/faq",
641+
"redirect_document_id": false
642+
},
568643
{
569644
"source_path": "articles/managed-ccf/application-scenarios.md",
570645
"redirect_url": "/azure/confidential-ledger/managed-confidential-consortium-framework-migration",
@@ -6579,7 +6654,11 @@
65796654
"source_path": "articles/reliability/reliability-health-insights.md",
65806655
"redirect_url": "/azure/azure-health-insights/reliability-health-insights",
65816656
"redirect_document_id": false
6657+
},
6658+
{
6659+
"source_path": "articles/reliability/migrate-load-balancer.md",
6660+
"redirect_url": "/azure/reliability/reliability-load-balancer",
6661+
"redirect_document_id": false
65826662
}
6583-
65846663
]
65856664
}

articles/application-gateway/application-gateway-diagnostics.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ Azure services are transitioning to resource-specific mode. As part of this migr
7373

7474
The toggle determines whether logs for the selected categories are routed to dedicated tables or to the AzureDiagnostics table. When switching to resource-specific mode, only newly selected categories use the dedicated tables; existing streams continue unchanged until reconfigured.
7575

76-
Selecting resource-specific mode provides enhanced flexibility through workspace transformations, allowing you to preprocess data before ingestion.For guidance on configuring workspace transformations, see: [Tutorial: Add a workspace transformation to Azure Monitor Logs by using the Azure portal](/azure/azure-monitor/logs/tutorial-workspace-transformations-portal.md)
76+
Selecting resource-specific mode provides enhanced flexibility through workspace transformations, allowing you to preprocess data before ingestion.For guidance on configuring workspace transformations, see: [Tutorial: Add a workspace transformation to Azure Monitor Logs by using the Azure portal](/azure/azure-monitor/logs/tutorial-workspace-transformations-portal#overview)
7777

7878

7979
## Examples of optimizing access logs using Workspace Transformations
@@ -99,7 +99,7 @@ Other storage locations:
9999
- **Azure Event Hubs**: Event hubs are a great option for integrating with other security information and event management (SIEM) tools to get alerts on your resources.
100100
- **Azure Monitor partner integrations**.
101101

102-
Learn more about the Azure Monitor's [diagnostic settings destinations](/azure/azure-monitor/essentials/diagnostic-settings.md) .
102+
Learn more about the Azure Monitor's [diagnostic settings destinations](/azure/azure-monitor/essentials/diagnostic-settings#create-a-diagnostic-setting) .
103103

104104
## Enable logging through PowerShell
105105

articles/artifact-signing/TOC.yml

Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
- name: Artifact Signing documentation
2+
href: ./index.yml
3+
expanded: true
4+
items:
5+
- name: Overview
6+
items:
7+
- name: What is the Artifact Signing service?
8+
href: overview.md
9+
- name: Quickstarts
10+
items:
11+
- name: Set up Artifact Signing
12+
href: quickstart.md
13+
- name: How-to guides
14+
items:
15+
- name: Set up signing integrations to use Artifact Signing
16+
href: how-to-signing-integrations.md
17+
- name: Sign a CI policy by using Artifact Signing
18+
href: how-to-sign-ci-policy.md
19+
- name: Access signed transactions in Artifact Signing
20+
href: how-to-sign-history.md
21+
- name: Revoke a certificate profile in Artifact Signing
22+
href: how-to-cert-revocation.md
23+
- name: Renew or delete Artifact Signing identity validation
24+
href: how-to-renew-identity-validation.md
25+
- name: Change the account SKU (pricing tier)
26+
href: how-to-change-sku.md
27+
- name: Device Guard Signing Service Migration
28+
href: how-to-device-guard-signing-service-migration.md
29+
- name: Tutorials
30+
items:
31+
- name: Assign roles in Artifact Signing
32+
href: tutorial-assign-roles.md
33+
- name: Concepts
34+
items:
35+
- name: Artifact Signing trust models
36+
href: concept-trust-models.md
37+
- name: Artifact Signing resources and roles
38+
href: concept-resources-roles.md
39+
- name: Artifact Signing certificate management
40+
href: concept-certificate-management.md
41+
- name: FAQ
42+
items:
43+
- name: Frequently asked questions about Artifact Signing
44+
href: faq.yml
Lines changed: 88 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,88 @@
1+
---
2+
title: Artifact Signing certificate management
3+
description: Get an introduction to Artifact Signing certificates. Learn about unique certificate attributes, the service's zero-touch certificate lifecycle management process, and effective ways to manage certificates.
4+
titleSuffix: "Azure"
5+
author: TacoTechSharma
6+
ms.author: mesharm
7+
ms.service: trusted-signing
8+
ms.topic: concept-article
9+
ms.date: 01/06/2026
10+
ms.custom: template-concept
11+
---
12+
13+
# Artifact Signing certificate management
14+
15+
This article describes Artifact Signing certificates, including their two unique attributes, the service's zero-touch lifecycle management process, the importance of time stamp countersignatures, and Microsoft active threat monitoring and revocation actions.
16+
17+
The certificates that are used in the Artifact Signing service follow standard practices for X.509 code signing certificates. To support a healthy ecosystem, the service includes a fully managed experience for X.509 certificates and asymmetric keys for signing. The fully managed Artifact Signing experience provides all certificate lifecycle actions for all certificates in an Artifact Signing certificate profile resource.
18+
19+
## Certificate attributes
20+
21+
Artifact Signing uses the certificate profile resource type to create and manage X.509 v3 certificates that Artifact Signing customers use for signing. The certificates conform to the RFC 5280 standard and to relevant Microsoft PKI Services Certificate Policy (CP) and Certification Practice Statements (CPS) resources that are in the [Microsoft PKI Services repository](https://www.microsoft.com/pkiops/docs/repository.htm).
22+
23+
In addition to standard features, certificate profiles in Artifact Signing include the following two unique features to help mitigate risks and impacts that are associated with misuse or abuse of certificate signing:
24+
25+
- Short-lived certificates
26+
- Subscriber identity validation Extended Key Usage (EKU) for durable identity pinning
27+
28+
### Short-lived certificates
29+
30+
To help reduce the impact of signing misuse and abuse, Artifact Signing certificates are renewed daily and are valid for only 72 hours. In these short-lived certificates, revocation actions can be as acute as a single day or as broad as needed to cover any incidents of misuse and abuse.
31+
32+
For example, if it's determined that a subscriber signed code that was malware or a potentially unwanted application (PUA) as defined in [How Microsoft identifies malware and potentially unwanted applications](/microsoft-365/security/defender/criteria), revocation actions can be isolated to revoking only the certificate that signed the malware or PUA. The revocation affects only the code that was signed by using that certificate on the day that it was issued. The revocation doesn't apply to any code that was signed before that day or after that day.
33+
34+
### Subscriber identity validation EKU
35+
36+
It's common for X.509 end-entity signing certificates to be renewed on a regular timeline to ensure key hygiene. Due to Artifact Signing's *daily certificate renewal*, pinning trust or validation to an end-entity certificate that uses certificate attributes (for example, the public key) or a certificate's *thumbprint* (the hash of the certificate) isn't durable. Also, Subject Distinguished Name (subject DN) values can change over the lifetime of an identity or organization.
37+
38+
To address these issues, Artifact Signing provides a durable identity value in each certificate that's associated with the subscription's identity validation resource. The durable identity value is a custom EKU that has the prefix `1.3.6.1.4.1.311.97.` and is followed by more octet values that are unique to the identity validation resource that's used on the certificate profile. Here are some examples:
39+
40+
- **Public Trust identity validation example**
41+
42+
A value of `1.3.6.1.4.1.311.97.990309390.766961637.194916062.941502583` indicates an Artifact Signing subscriber that uses Public Trust identity validation. The `1.3.6.1.4.1.311.97.` prefix is the Artifact Signing Public Trust code signing type. The `990309390.766961637.194916062.941502583` value is unique to the subscriber's identity validation for Public Trust.
43+
44+
- **Private Trust identity validation example**
45+
46+
A value of `1.3.6.1.4.1.311.97.1.3.1.29433.35007.34545.16815.37291.11644.53265.56135` indicates an Artifact Signing subscriber that uses Private Trust identity validation. The `1.3.6.1.4.1.311.97.1.3.1.` prefix is the Artifact Signing Private Trust code signing type. The `29433.35007.34545.16815.37291.11644.53265.56135` value is unique to the subscriber's identity validation for Private Trust.
47+
48+
Because you can use Private Trust identity validations for Windows Defender Application Control (WDAC) code integrity (CI) policy signing, they have a different EKU prefix: `1.3.6.1.4.1.311.97.1.4.1.`. But the suffix values match the durable identity value for the subscriber's identity validation for Private Trust.
49+
50+
> [!NOTE]
51+
> You can use durable identity EKUs in WDAC CI policy settings to pin trust to an identity in Artifact Signing. For information about creating WDAC policies, see [Use signed policies to protect Windows Defender Application Control against tampering](/windows/security/application-security/application-control/windows-defender-application-control/deployment/use-signed-policies-to-protect-wdac-against-tampering) and [Windows Defender Application Control Wizard](/windows/security/application-security/application-control/windows-defender-application-control/design/wdac-wizard).
52+
53+
All Artifact Signing Public Trust certificates also contain the `1.3.6.1.4.1.311.97.1.0` EKU to be easily identified as a publicly trusted certificate from Artifact Signing. All EKUs are provided in addition to the code signing EKU (`1.3.6.1.5.5.7.3.3`) to identify the specific usage type for certificate consumers. The only exception is certificates that are the Artifact Signing Private Trust CI Policy certificate profile type, in which no code signing EKU is present.
54+
55+
## Zero-touch certificate lifecycle management
56+
57+
Artifact Signing aims to simplify signing as much as possible for each subscriber. A major part of simplifying signing is to provide a fully automated certificate lifecycle management solution. The Artifact Signing zero-touch certificate lifecycle management feature automatically handles all standard certificate actions for you.
58+
59+
It includes:
60+
61+
- Secure key generation, storage, and usage in FIPS 140-2 Level 3 hardware crypto modules that the service manages.
62+
- Daily renewals of certificates to ensure that you always have a valid certificate to use to sign your certificate profile resources.
63+
64+
Every certificate that you create and issue is logged in the Azure portal. You can view logging data feeds that include certificate serial number, thumbprint, created date, expiry date, and status (for example, **Active**, **Expired**, or **Revoked**) in the portal.
65+
66+
> [!NOTE]
67+
> Artifact Signing does *not* support importing or exporting private keys and certificates. All certificates and keys that you use in Artifact Signing are managed inside FIPS 140-2 Level 3 operated hardware crypto modules.
68+
69+
## Time stamp countersignatures
70+
71+
The standard practice in signing is to countersign all signatures with an RFC 3161-compliant time stamp. Because Artifact Signing uses short-lived certificates, time stamp countersigning is critical for a signature to be valid beyond the life of the signing certificate. A time stamp countersignature provides a cryptographically secure time stamp token from a Time Stamping Authority (TSA) that meets the standards of the Code Signing Baseline Requirements (CSBRs).
72+
73+
A countersignature provides a reliable date and time of when signing occurred. If the time stamp countersignature is inside the signing certificate's validity period and the TSA certificate's validity period, the signature is valid. It's valid long after the signing certificate and the TSA certificate expire (unless either are revoked).
74+
75+
Artifact Signing provides a generally available TSA endpoint at `http://timestamp.acs.microsoft.com`. We recommend that all Artifact Signing subscribers use this TSA endpoint to countersign any signatures they produce.
76+
77+
## Active monitoring
78+
79+
Artifact Signing passionately supports a healthy ecosystem by using active threat intelligence monitoring to constantly look for cases of misuse and abuse of Artifact Signing subscribers' Public Trust certificates.
80+
81+
- For a confirmed case of misuse or abuse, Artifact Signing immediately takes the necessary steps to mitigate and remediate any threats, including targeted or broad certificate revocation and account suspension.
82+
83+
- You can complete revocation actions directly in the Azure portal for any certificates that are logged under a certificate profile that you own.
84+
85+
## Next step
86+
87+
>[!div class="nextstepaction"]
88+
>[Set up Artifact Signing](./quickstart.md)

0 commit comments

Comments
 (0)