You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The root README should be updated with a project description and relevant information. it can still include the CLI documentation or we can create a separate md in a docs folder detailing the CLI.
We should also create some examples of using witness.
The text was updated successfully, but these errors were encountered:
I'm especially interested in the gitlab docs and some sort of architecture diagram. For example, I'm trying to figure out if there is a central server that stores the attestation details or anything like that or if I need to build a workload around managing that, especially in an air gap space.
It depends on your trust model. Using keyless signing would require some sort of timestamp authority. In our current model, we use rekor (https://log.testifysec.io) for transparency and timestamping. These attestations are json objects that can be airgapped and verified in the target environment. The trust is maintained by the certificate authority, as long as you have a trusted CA on both ends you should be good.
I've created an issue here to track air-gapped verification.
The root README should be updated with a project description and relevant information. it can still include the CLI documentation or we can create a separate md in a docs folder detailing the CLI.
We should also create some examples of using witness.
The text was updated successfully, but these errors were encountered: