Skip to content

Commit a0902e0

Browse files
authored
Require identity and issuer (#176)
Signed-off-by: Marina Moore <[email protected]>
1 parent 6b08237 commit a0902e0

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

tap18.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ In order to facilitate use of Fulcio, delegations may list an OIDC identity, suc
4141
}
4242
```
4343

44-
Where IDENTITY is the OIDC identity of the party who is authorized to sign and ISSUER is the OIDC entity used by Fulcio for verification. For example, identity could be "[email protected]" with an issuer "https://accounts.google.com".
44+
Where IDENTITY is the OIDC identity of the party who is authorized to sign and ISSUER is the OIDC entity used by Fulcio for verification. For example, identity could be "[email protected]" with an issuer "https://accounts.google.com". Both IDENTITY and ISSUER are required for this keytype.
4545

4646
The root certificate or certificate chain for the Fulcio server MUST be obtained using the Sigstore [root of trust](https://github.com/sigstore/root-signing). The client MUST use a single Fulcio instance.
4747

@@ -81,7 +81,7 @@ While performing the steps in the [TUF client workflow](https://theupdateframewo
8181

8282
Offline verification includes the following steps:
8383

84-
* Verify the signature on the certificate to ensure that the signature chains up to the trusted Fulcio root.
84+
* Verify the signature on the certificate to ensure that the signature chains up to the trusted Fulcio root and that the identity and issuer in the certificate match those found in the delegation.
8585
* Verify the Fulcio certificate's bundled CT inclusion proof with the trusted certificate log public key.
8686
* Verify the signature on the TUF metadata using the key from the Fulcio certificate.
8787
* Verify the SET to ensure that the signature was signed during certificate validity.

0 commit comments

Comments
 (0)