Skip to content

Commit 2ba5dc8

Browse files
authored
Clarify client is creating the public private key pair in 'How Sigstore works' section of overview. (#359)
Signed-off-by: Sam Pinkus <sgpinkus@gmail.com>
1 parent 65f17c3 commit 2ba5dc8

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

content/en/about/overview.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ The signer ideally forgoes using long-lived keypairs. With “keyless” or “e
4646

4747
## How Sigstore works
4848

49-
A Sigstore client, such as Cosign, requests a certificate from our code-signing certificate authority (Fulcio). A verifiable OpenID Connect identity token, which contains a user's email address or service account, is provided in the request. The certificate authority verifies this token and issues a short-lived certificate bound to the provided identity.
49+
A Sigstore client, such as Cosign, creates a public/private key pair and makes a certificate signing request to our code-signing certificate authority (Fulcio) with the public key. A verifiable OpenID Connect identity token, which contains a user's email address or service account, is also provided in the request. The certificate authority verifies this token and issues a short-lived certificate bound to the provided identity and public key.
5050

5151
You don’t have to manage signing keys, and Sigstore services never obtain your private key. The public key that a Sigstore client creates gets bound to the issued certificate, and the private key is discarded after a single signing.
5252

0 commit comments

Comments
 (0)