<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Key Management on</title><link>https://deploy-preview-426--docssigstore.netlify.app/cosign/key_management/</link><description>Recent content in Key Management on</description><generator>Hugo -- gohugo.io</generator><lastBuildDate>Tue, 06 Oct 2020 08:49:15 +0000</lastBuildDate><atom:link href="https://deploy-preview-426--docssigstore.netlify.app/cosign/key_management/index.xml" rel="self" type="application/rss+xml"/><item><title>Overview</title><link>https://deploy-preview-426--docssigstore.netlify.app/cosign/key_management/overview/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://deploy-preview-426--docssigstore.netlify.app/cosign/key_management/overview/</guid><description>Sigstore handles keys and key management internally by default. However, while the default makes it unnecessary, you can configure Sigstore, through Cosign, to work with KMS providers. This page contains detailed instructions on how to configure cosign to work with KMS providers. Right now cosign supports AWS KMS, GCP KMS, Azure Key Vault, Hashicorp Vault, OpenBao and Kubernetes Secrets and with the hope to support more in the future!
Basic Usage # When referring to a key managed by a KMS provider, cosign takes a go-cloud style URI to refer to the specific provider.</description></item><item><title>Signing with Self-Managed Keys</title><link>https://deploy-preview-426--docssigstore.netlify.app/cosign/key_management/signing_with_self-managed_keys/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://deploy-preview-426--docssigstore.netlify.app/cosign/key_management/signing_with_self-managed_keys/</guid><description>To generate a key pair in Cosign, run cosign generate-key-pair. You&amp;rsquo;ll be interactively prompted to provide a password.
$ cosign generate-key-pair Enter password for private key: Enter again: Private key written to cosign.key Public key written to cosign.pub Alternatively, you can use the COSIGN_PASSWORD environment variable to provide one.
Note: Cosign supports RSA, ECDSA, and ED25519 keys. For RSA, Cosign only supports RSA PKCS#1.5 padded keys.
Key generation and management # To generate keys using a KMS provider, you can use the cosign generate-key-pair command with the --kms flag.</description></item><item><title>Importing Key Pairs</title><link>https://deploy-preview-426--docssigstore.netlify.app/cosign/key_management/import-keypair/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://deploy-preview-426--docssigstore.netlify.app/cosign/key_management/import-keypair/</guid><description>Currently only supports RSA and ECDSA private keys in PEM format
Import a Key Pair # To use a local key not generated by Cosign for signing, the key must be imported. To use a key stored in a KMS, importing is not necessary and the key can be specified by resource name.
The importing of a key pair with cosign is as follows.
$ cosign import-key-pair --key opensslrsakey.pem Enter password for private key: Enter password for private key again: Private key written to import-cosign.</description></item><item><title>Hardware Tokens</title><link>https://deploy-preview-426--docssigstore.netlify.app/cosign/key_management/hardware-based-tokens/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://deploy-preview-426--docssigstore.netlify.app/cosign/key_management/hardware-based-tokens/</guid><description>The cosign command line tool optionally supports hardware tokens for signing and key management. This support is enabled through the PIV protocol and the go-piv library, which is not included in the standard release. Use make cosign-pivkey-pkcs11key, or go build -tags=pivkey,pkcs11key ./cmd/cosign, to build cosign with support for hardware tokens.
Background information # Cosign&amp;rsquo;s hardware token support requires libpcsclite on platforms other than Windows and OSX. See go-piv&amp;rsquo;s installation instructions for your platform.</description></item></channel></rss>