You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
All references to 'Azure Trusted Signing' updated to 'Azure Artifact
Signing (formerly Trusted Signing)' across four files to match the
authoritative naming used in msix-pr reference files (sign-msix-
package-guide.md, msix-troubleshooting-guide.md).
Files updated:
- choose-distribution-path.md (5 instances)
- smartscreen-reputation.md (6 instances including table cell and heading)
- distribution-feature-status.md (1 instance in related content)
- packaging/index.md (3 instances including TIP block)
URLs (/azure/trusted-signing/) unchanged — correct regardless of
display name.
Co-authored-by: Copilot <[email protected]>
Copy file name to clipboardExpand all lines: hub/apps/package-and-deploy/choose-distribution-path.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,8 +18,8 @@ How you distribute your Windows app affects code signing costs, update mechanics
18
18
| Path | Best for | Code signing cost | Auto-update | Enterprise MDM | Distributed via Store |
19
19
|---|---|---|---|---|---|
20
20
|**Microsoft Store**| Consumer and business apps, broad reach | ✅ Free (Store signs for you) | ✅ Built-in | ✅ Via Intune with Company Portal | ✅ Yes |
21
-
|**MSIX sideload (enterprise)**| Internal LOB apps via Intune/ConfigMgr | 💲 Azure Trusted Signing (~$10/mo) or self-signed + Intune cert profile | ✅ Via App Installer file or MDM | ✅ Native | ❌ No |
22
-
|**MSIX direct download (ISV)**| Commercial apps sold from your own site | 💲 CA-trusted cert required ([Azure Trusted Signing](/azure/trusted-signing/) recommended) | ✅ Via `.appinstaller` file | ⚠️ Limited | ❌ No |
21
+
|**MSIX sideload (enterprise)**| Internal LOB apps via Intune/ConfigMgr | 💲 Azure Artifact Signing (formerly Trusted Signing) (~$10/mo) or self-signed + Intune cert profile | ✅ Via App Installer file or MDM | ✅ Native | ❌ No |
22
+
|**MSIX direct download (ISV)**| Commercial apps sold from your own site | 💲 CA-trusted cert required ([Azure Artifact Signing (formerly Trusted Signing)](/azure/trusted-signing/) recommended) | ✅ Via `.appinstaller` file | ⚠️ Limited | ❌ No |
23
23
|**Packaging with external location**| Existing apps with own installer needing Windows features | 💲 Same as MSIX direct download | ✅ Your existing mechanism | ⚠️ Limited | ❌ No |
24
24
25
25
## Microsoft Store (recommended)
@@ -55,7 +55,7 @@ For internal line-of-business apps that will be deployed to managed devices via
55
55
- Full package identity and access to Windows features (notifications, background tasks, etc.)
56
56
57
57
**Code signing:**
58
-
- Use [Azure Trusted Signing](/azure/trusted-signing/) (~$10/month) for a CA-trusted certificate, or
58
+
- Use [Azure Artifact Signing (formerly Trusted Signing)](/azure/trusted-signing/) (~$10/month) for a CA-trusted certificate, or
59
59
- Use a self-signed certificate deployed to endpoints via Intune Trusted Certificate profiles
60
60
61
61
**Requirements:**
@@ -81,7 +81,7 @@ For commercial apps sold directly from your website (not through the Store), you
81
81
82
82
**Code signing:**
83
83
- A CA-trusted code signing certificate is required — users cannot install unsigned or self-signed MSIX packages without trusting the cert manually
84
-
-[Azure Trusted Signing](/azure/trusted-signing/) (~$10/month) is Microsoft's recommended option: no hardware token required, integrates with CI/CD pipelines
84
+
-[Azure Artifact Signing (formerly Trusted Signing)](/azure/trusted-signing/) (~$10/month) is Microsoft's recommended option: no hardware token required, integrates with CI/CD pipelines
85
85
- Traditional OV certificates are also accepted (typically $150–300/year from a CA)
86
86
87
87
**SmartScreen:** New certificates accumulate SmartScreen reputation over time based on download volume. Expect some SmartScreen prompts for new releases. See [SmartScreen reputation for Windows app developers](smartscreen-reputation.md).
@@ -127,4 +127,4 @@ Many Windows apps are distributed using MSI, WiX, Inno Setup, ClickOnce, or simi
127
127
-[SmartScreen reputation for Windows app developers](smartscreen-reputation.md)
128
128
-[Current status of Windows app distribution features](distribution-feature-status.md)
129
129
-[Publish to the Microsoft Store](/windows/apps/publish/)
Copy file name to clipboardExpand all lines: hub/apps/package-and-deploy/packaging/index.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -83,12 +83,12 @@ Before you commit to unpackaged, check the [features table above](#features-that
83
83
| Scenario | Recommended model | Details |
84
84
|---|---|---|
85
85
|**Indie developer publishing to the Microsoft Store**| Packaged (MSIX) | The Store requires MSIX. WinUI 3 apps are packaged by default — no changes needed. **Code signing is handled free by the Store.** → [Distribute your packaged app](../../distribute-through-store/how-to-distribute-your-win32-app-through-microsoft-store.md)|
86
-
|**Enterprise app deployed via Intune or Configuration Manager**| Packaged, or external location for existing installers | New apps should use MSIX. Existing apps with their own installer can use packaging with external location. **Code signing:** use a self-signed cert (trusted via Intune, Group Policy, or Configuration Manager) or [Azure Trusted Signing](/azure/trusted-signing/). → [Deploy packaged apps](../../windows-app-sdk/deploy-packaged-apps.md)|
87
-
|**ISV shipping a direct download with own installer**| Packaging with external location | Register a lightweight identity package alongside your existing installer. **Code signing:** a CA-trusted certificate is required for non-Store distribution. [Azure Trusted Signing](/azure/trusted-signing/) is the recommended lower-cost option. → [Grant package identity](../../desktop/modernize/grant-identity-to-nonpackaged-apps-overview.md)|
86
+
|**Enterprise app deployed via Intune or Configuration Manager**| Packaged, or external location for existing installers | New apps should use MSIX. Existing apps with their own installer can use packaging with external location. **Code signing:** use a self-signed cert (trusted via Intune, Group Policy, or Configuration Manager) or [Azure Artifact Signing (formerly Trusted Signing)](/azure/trusted-signing/). → [Deploy packaged apps](../../windows-app-sdk/deploy-packaged-apps.md)|
87
+
|**ISV shipping a direct download with own installer**| Packaging with external location | Register a lightweight identity package alongside your existing installer. **Code signing:** a CA-trusted certificate is required for non-Store distribution. [Azure Artifact Signing (formerly Trusted Signing)](/azure/trusted-signing/) is the recommended lower-cost option. → [Grant package identity](../../desktop/modernize/grant-identity-to-nonpackaged-apps-overview.md)|
88
88
|**Internal tool or developer utility**| Unpackaged | Simplest to build and deploy. The Windows App SDK works via NuGet, but some features won't be available. |
89
89
90
90
> [!TIP]
91
-
> **Not sure about code signing costs?** Publishing through the Microsoft Store means you don't need to separately obtain or manage a certificate for end-user trust. For other distribution paths, your signing approach depends on deployment context — enterprise environments can trust a self-signed certificate through device management, while broader non-Store distribution typically requires a CA-trusted code signing solution. [Azure Trusted Signing](/azure/trusted-signing/) is Microsoft's recommended option (see [pricing](https://azure.microsoft.com/pricing/details/trusted-signing/)), with no hardware token required.
91
+
> **Not sure about code signing costs?** Publishing through the Microsoft Store means you don't need to separately obtain or manage a certificate for end-user trust. For other distribution paths, your signing approach depends on deployment context — enterprise environments can trust a self-signed certificate through device management, while broader non-Store distribution typically requires a CA-trusted code signing solution. [Azure Artifact Signing (formerly Trusted Signing)](/azure/trusted-signing/) is Microsoft's recommended option (see [pricing](https://azure.microsoft.com/pricing/details/trusted-signing/)), with no hardware token required.
92
92
93
93
## Framework-dependent vs self-contained deployment
| Self-signed | ❌ Strong block — cert not trusted by default; same behavior as unsigned |
37
37
| OV certificate (Organization Validated) | ⚠️ Warning — app flagged as unrecognized until reputation accumulates; publisher name is displayed as verified |
38
38
| EV certificate (Extended Validation) | ⚠️ Warning — same as OV for new files (no longer instant bypass) |
39
-
| Azure Trusted Signing certificate | ⚠️ Warning for new files; reputation accumulates normally |
39
+
| Azure Artifact Signing (formerly Trusted Signing) certificate | ⚠️ Warning for new files; reputation accumulates normally |
40
40
| Microsoft Store | ✅ No warning — covered by Microsoft's certificate |
41
41
42
42
EV certificates still provide value (they require more identity validation, which may matter for enterprise procurement), but they no longer provide instant SmartScreen bypass. Paying a premium for EV solely to avoid SmartScreen warnings is no longer justified.
@@ -47,9 +47,9 @@ EV certificates still provide value (they require more identity validation, whic
47
47
48
48
Apps published through the Microsoft Store are re-signed by Microsoft and carry full reputation. Users will never see a SmartScreen warning for a Store-installed app.
[Azure Trusted Signing](/azure/trusted-signing/) is Microsoft's recommended code signing service for non-Store distribution:
52
+
[Azure Artifact Signing (formerly Trusted Signing)](/azure/trusted-signing/) is Microsoft's recommended code signing service for non-Store distribution:
53
53
54
54
-**Cost:** Approximately $10/month — significantly lower than traditional CA certificates
@@ -60,7 +60,7 @@ Apps published through the Microsoft Store are re-signed by Microsoft and carry
60
60
61
61
Traditional code signing certificates from Certificate Authorities (DigiCert, Sectigo, etc.) are also accepted. OV certificates typically cost $150–300/year; EV certificates $400+/year. Both now have equivalent SmartScreen behavior for new files.
62
62
63
-
If you already have an OV or EV certificate, it remains valid and functional. If you're purchasing a new certificate, Azure Trusted Signing is typically the better choice for Windows app distribution.
63
+
If you already have an OV or EV certificate, it remains valid and functional. If you're purchasing a new certificate, Azure Artifact Signing (formerly Trusted Signing) is typically the better choice for Windows app distribution.
64
64
65
65
## What to expect when you publish a new app
66
66
@@ -78,13 +78,13 @@ There is no way to manually submit a file for SmartScreen reputation review for
78
78
-**Publish to the Microsoft Store** where feasible — this is the most reliable way to avoid warnings entirely
79
79
-**Sign every release** — unsigned files show a stronger SmartScreen warning than signed files, and enterprises may block unsigned binaries entirely
80
80
-**Use a consistent signing identity** — changing your signing certificate affects the publisher trust signal; note that each new build's hash also starts with no file reputation regardless of certificate continuity
81
-
-**Use Azure Trusted Signing** for non-Store distribution — it's cost-effective and integrates with automated build pipelines
81
+
-**Use Azure Artifact Signing (formerly Trusted Signing)** for non-Store distribution — it's cost-effective and integrates with automated build pipelines
82
82
-**Communicate with early adopters** — for new apps, let beta users know they may see a SmartScreen prompt on first download, and that they should only proceed after verifying the publisher and confirming they trust the download source
83
83
84
84
## Related content
85
85
86
86
-[Choose a distribution path for your Windows app](choose-distribution-path.md)
87
87
-[Current status of Windows app distribution features](distribution-feature-status.md)
88
88
-[Sign an app package using SignTool](/windows/msix/package/sign-app-package-using-signtool)
0 commit comments