Skip to content

Commit a0c1b58

Browse files
Pre-publish accuracy fix: Azure Artifact Signing naming consistency (#6652)
All references to 'Azure Trusted Signing' updated to 'Azure Artifact Signing (formerly Trusted Signing)' across four files to match the authoritative naming used in msix-pr reference files (sign-msix- package-guide.md, msix-troubleshooting-guide.md). Files updated: - choose-distribution-path.md (5 instances) - smartscreen-reputation.md (6 instances including table cell and heading) - distribution-feature-status.md (1 instance in related content) - packaging/index.md (3 instances including TIP block) URLs (/azure/trusted-signing/) unchanged — correct regardless of display name. Co-authored-by: Copilot <[email protected]>
1 parent 8f8da71 commit a0c1b58

4 files changed

Lines changed: 15 additions & 15 deletions

File tree

hub/apps/package-and-deploy/choose-distribution-path.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,8 @@ How you distribute your Windows app affects code signing costs, update mechanics
1818
| Path | Best for | Code signing cost | Auto-update | Enterprise MDM | Distributed via Store |
1919
|---|---|---|---|---|---|
2020
| **Microsoft Store** | Consumer and business apps, broad reach | ✅ Free (Store signs for you) | ✅ Built-in | ✅ Via Intune with Company Portal | ✅ Yes |
21-
| **MSIX sideload (enterprise)** | Internal LOB apps via Intune/ConfigMgr | 💲 Azure Trusted Signing (~$10/mo) or self-signed + Intune cert profile | ✅ Via App Installer file or MDM | ✅ Native | ❌ No |
22-
| **MSIX direct download (ISV)** | Commercial apps sold from your own site | 💲 CA-trusted cert required ([Azure Trusted Signing](/azure/trusted-signing/) recommended) | ✅ Via `.appinstaller` file | ⚠️ Limited | ❌ No |
21+
| **MSIX sideload (enterprise)** | Internal LOB apps via Intune/ConfigMgr | 💲 Azure Artifact Signing (formerly Trusted Signing) (~$10/mo) or self-signed + Intune cert profile | ✅ Via App Installer file or MDM | ✅ Native | ❌ No |
22+
| **MSIX direct download (ISV)** | Commercial apps sold from your own site | 💲 CA-trusted cert required ([Azure Artifact Signing (formerly Trusted Signing)](/azure/trusted-signing/) recommended) | ✅ Via `.appinstaller` file | ⚠️ Limited | ❌ No |
2323
| **Packaging with external location** | Existing apps with own installer needing Windows features | 💲 Same as MSIX direct download | ✅ Your existing mechanism | ⚠️ Limited | ❌ No |
2424

2525
## Microsoft Store (recommended)
@@ -55,7 +55,7 @@ For internal line-of-business apps that will be deployed to managed devices via
5555
- Full package identity and access to Windows features (notifications, background tasks, etc.)
5656

5757
**Code signing:**
58-
- Use [Azure Trusted Signing](/azure/trusted-signing/) (~$10/month) for a CA-trusted certificate, or
58+
- Use [Azure Artifact Signing (formerly Trusted Signing)](/azure/trusted-signing/) (~$10/month) for a CA-trusted certificate, or
5959
- Use a self-signed certificate deployed to endpoints via Intune Trusted Certificate profiles
6060

6161
**Requirements:**
@@ -81,7 +81,7 @@ For commercial apps sold directly from your website (not through the Store), you
8181

8282
**Code signing:**
8383
- A CA-trusted code signing certificate is required — users cannot install unsigned or self-signed MSIX packages without trusting the cert manually
84-
- [Azure Trusted Signing](/azure/trusted-signing/) (~$10/month) is Microsoft's recommended option: no hardware token required, integrates with CI/CD pipelines
84+
- [Azure Artifact Signing (formerly Trusted Signing)](/azure/trusted-signing/) (~$10/month) is Microsoft's recommended option: no hardware token required, integrates with CI/CD pipelines
8585
- Traditional OV certificates are also accepted (typically $150–300/year from a CA)
8686

8787
**SmartScreen:** New certificates accumulate SmartScreen reputation over time based on download volume. Expect some SmartScreen prompts for new releases. See [SmartScreen reputation for Windows app developers](smartscreen-reputation.md).
@@ -127,4 +127,4 @@ Many Windows apps are distributed using MSI, WiX, Inno Setup, ClickOnce, or simi
127127
- [SmartScreen reputation for Windows app developers](smartscreen-reputation.md)
128128
- [Current status of Windows app distribution features](distribution-feature-status.md)
129129
- [Publish to the Microsoft Store](/windows/apps/publish/)
130-
- [Azure Trusted Signing](/azure/trusted-signing/)
130+
- [Azure Artifact Signing (formerly Trusted Signing)](/azure/trusted-signing/)

hub/apps/package-and-deploy/distribution-feature-status.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -119,4 +119,4 @@ The `MsixPackaging@1` task in Azure DevOps pipelines uses MSBuild 4.8.4161.0 (in
119119
- [SmartScreen reputation for Windows app developers](smartscreen-reputation.md)
120120
- [App Installer file overview](/windows/msix/app-installer/app-installer-file-overview)
121121
- [Auto-update and repair apps](/windows/msix/app-installer/auto-update-and-repair--overview)
122-
- [Azure Trusted Signing](/azure/trusted-signing/)
122+
- [Azure Artifact Signing (formerly Trusted Signing)](/azure/trusted-signing/)

hub/apps/package-and-deploy/packaging/index.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -83,12 +83,12 @@ Before you commit to unpackaged, check the [features table above](#features-that
8383
| Scenario | Recommended model | Details |
8484
|---|---|---|
8585
| **Indie developer publishing to the Microsoft Store** | Packaged (MSIX) | The Store requires MSIX. WinUI 3 apps are packaged by default — no changes needed. **Code signing is handled free by the Store.**[Distribute your packaged app](../../distribute-through-store/how-to-distribute-your-win32-app-through-microsoft-store.md) |
86-
| **Enterprise app deployed via Intune or Configuration Manager** | Packaged, or external location for existing installers | New apps should use MSIX. Existing apps with their own installer can use packaging with external location. **Code signing:** use a self-signed cert (trusted via Intune, Group Policy, or Configuration Manager) or [Azure Trusted Signing](/azure/trusted-signing/). → [Deploy packaged apps](../../windows-app-sdk/deploy-packaged-apps.md) |
87-
| **ISV shipping a direct download with own installer** | Packaging with external location | Register a lightweight identity package alongside your existing installer. **Code signing:** a CA-trusted certificate is required for non-Store distribution. [Azure Trusted Signing](/azure/trusted-signing/) is the recommended lower-cost option. → [Grant package identity](../../desktop/modernize/grant-identity-to-nonpackaged-apps-overview.md) |
86+
| **Enterprise app deployed via Intune or Configuration Manager** | Packaged, or external location for existing installers | New apps should use MSIX. Existing apps with their own installer can use packaging with external location. **Code signing:** use a self-signed cert (trusted via Intune, Group Policy, or Configuration Manager) or [Azure Artifact Signing (formerly Trusted Signing)](/azure/trusted-signing/). → [Deploy packaged apps](../../windows-app-sdk/deploy-packaged-apps.md) |
87+
| **ISV shipping a direct download with own installer** | Packaging with external location | Register a lightweight identity package alongside your existing installer. **Code signing:** a CA-trusted certificate is required for non-Store distribution. [Azure Artifact Signing (formerly Trusted Signing)](/azure/trusted-signing/) is the recommended lower-cost option. → [Grant package identity](../../desktop/modernize/grant-identity-to-nonpackaged-apps-overview.md) |
8888
| **Internal tool or developer utility** | Unpackaged | Simplest to build and deploy. The Windows App SDK works via NuGet, but some features won't be available. |
8989

9090
> [!TIP]
91-
> **Not sure about code signing costs?** Publishing through the Microsoft Store means you don't need to separately obtain or manage a certificate for end-user trust. For other distribution paths, your signing approach depends on deployment context — enterprise environments can trust a self-signed certificate through device management, while broader non-Store distribution typically requires a CA-trusted code signing solution. [Azure Trusted Signing](/azure/trusted-signing/) is Microsoft's recommended option (see [pricing](https://azure.microsoft.com/pricing/details/trusted-signing/)), with no hardware token required.
91+
> **Not sure about code signing costs?** Publishing through the Microsoft Store means you don't need to separately obtain or manage a certificate for end-user trust. For other distribution paths, your signing approach depends on deployment context — enterprise environments can trust a self-signed certificate through device management, while broader non-Store distribution typically requires a CA-trusted code signing solution. [Azure Artifact Signing (formerly Trusted Signing)](/azure/trusted-signing/) is Microsoft's recommended option (see [pricing](https://azure.microsoft.com/pricing/details/trusted-signing/)), with no hardware token required.
9292
9393
## Framework-dependent vs self-contained deployment
9494

hub/apps/package-and-deploy/smartscreen-reputation.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Historically, Extended Validation (EV) code signing certificates granted **immed
3636
| Self-signed | ❌ Strong block — cert not trusted by default; same behavior as unsigned |
3737
| OV certificate (Organization Validated) | ⚠️ Warning — app flagged as unrecognized until reputation accumulates; publisher name is displayed as verified |
3838
| EV certificate (Extended Validation) | ⚠️ Warning — same as OV for new files (no longer instant bypass) |
39-
| Azure Trusted Signing certificate | ⚠️ Warning for new files; reputation accumulates normally |
39+
| Azure Artifact Signing (formerly Trusted Signing) certificate | ⚠️ Warning for new files; reputation accumulates normally |
4040
| Microsoft Store | ✅ No warning — covered by Microsoft's certificate |
4141

4242
EV certificates still provide value (they require more identity validation, which may matter for enterprise procurement), but they no longer provide instant SmartScreen bypass. Paying a premium for EV solely to avoid SmartScreen warnings is no longer justified.
@@ -47,9 +47,9 @@ EV certificates still provide value (they require more identity validation, whic
4747

4848
Apps published through the Microsoft Store are re-signed by Microsoft and carry full reputation. Users will never see a SmartScreen warning for a Store-installed app.
4949

50-
### Azure Trusted Signing
50+
### Azure Artifact Signing (formerly Trusted Signing)
5151

52-
[Azure Trusted Signing](/azure/trusted-signing/) is Microsoft's recommended code signing service for non-Store distribution:
52+
[Azure Artifact Signing (formerly Trusted Signing)](/azure/trusted-signing/) is Microsoft's recommended code signing service for non-Store distribution:
5353

5454
- **Cost:** Approximately $10/month — significantly lower than traditional CA certificates
5555
- **No hardware token required** — integrates directly with CI/CD pipelines (GitHub Actions, Azure DevOps)
@@ -60,7 +60,7 @@ Apps published through the Microsoft Store are re-signed by Microsoft and carry
6060

6161
Traditional code signing certificates from Certificate Authorities (DigiCert, Sectigo, etc.) are also accepted. OV certificates typically cost $150–300/year; EV certificates $400+/year. Both now have equivalent SmartScreen behavior for new files.
6262

63-
If you already have an OV or EV certificate, it remains valid and functional. If you're purchasing a new certificate, Azure Trusted Signing is typically the better choice for Windows app distribution.
63+
If you already have an OV or EV certificate, it remains valid and functional. If you're purchasing a new certificate, Azure Artifact Signing (formerly Trusted Signing) is typically the better choice for Windows app distribution.
6464

6565
## What to expect when you publish a new app
6666

@@ -78,13 +78,13 @@ There is no way to manually submit a file for SmartScreen reputation review for
7878
- **Publish to the Microsoft Store** where feasible — this is the most reliable way to avoid warnings entirely
7979
- **Sign every release** — unsigned files show a stronger SmartScreen warning than signed files, and enterprises may block unsigned binaries entirely
8080
- **Use a consistent signing identity** — changing your signing certificate affects the publisher trust signal; note that each new build's hash also starts with no file reputation regardless of certificate continuity
81-
- **Use Azure Trusted Signing** for non-Store distribution — it's cost-effective and integrates with automated build pipelines
81+
- **Use Azure Artifact Signing (formerly Trusted Signing)** for non-Store distribution — it's cost-effective and integrates with automated build pipelines
8282
- **Communicate with early adopters** — for new apps, let beta users know they may see a SmartScreen prompt on first download, and that they should only proceed after verifying the publisher and confirming they trust the download source
8383

8484
## Related content
8585

8686
- [Choose a distribution path for your Windows app](choose-distribution-path.md)
8787
- [Current status of Windows app distribution features](distribution-feature-status.md)
8888
- [Sign an app package using SignTool](/windows/msix/package/sign-app-package-using-signtool)
89-
- [Azure Trusted Signing documentation](/azure/trusted-signing/)
89+
- [Azure Artifact Signing (formerly Trusted Signing) documentation](/azure/trusted-signing/)
9090
- [Microsoft Trusted Root Program requirements](/security/trusted-root/program-requirements)

0 commit comments

Comments
 (0)