OpsCanary
Back to daily brief
securitysupply chainPractitioner

Keyless Signing with Sigstore: Simplifying Artifact Security

5 min read Sigstore DocsApr 21, 2026
PractitionerHands-on experience recommended

In today's software landscape, managing keys securely is a daunting task. Keyless signing in Sigstore addresses this by associating identities with artifact signatures instead of relying on cryptographic keys. This approach not only simplifies the signing process but also enhances security by using short-lived certificates that bind ephemeral keys to trusted identities. By eliminating the need for developers to manage long-term keys, Sigstore makes the signing process more accessible and less error-prone.

The mechanics of keyless signing are straightforward yet powerful. When you sign an artifact, an in-memory public/private key pair is generated, and an identity token is retrieved. Sigstore's certificate authority verifies this token and issues a certificate that binds your identity to the public key. The private key is then destroyed shortly after signing, ensuring that it cannot be misused. This process is recorded in the Rekor transparency log, which timestamps the signing event and allows for public auditing. When a consumer wants to verify the artifact, Sigstore checks the signature against the timestamped entry in Rekor, confirming the authenticity of the software based on the verified identity of the signer.

In production, you need to ensure that your identity token is correctly configured. Use the --identity-token parameter to specify your token, and remember that it must contain the audience claim for Sigstore. Monitoring the Rekor log for unexpected signing events is crucial for maintaining trust in your artifacts. Be aware that while keyless signing simplifies many aspects of artifact security, it requires a solid understanding of how identity verification works and the implications of ephemeral keys.

Key takeaways

  • Understand keyless signing as a method that ties signatures to identities instead of keys.
  • Use Fulcio to obtain short-lived certificates that bind your identity to a public key.
  • Leverage the Rekor transparency log for auditing and verifying signing events.
  • Monitor the transparency log for unexpected signing events to maintain artifact integrity.
  • Configure your identity token correctly with the `--identity-token` parameter.

Why it matters

Keyless signing significantly reduces the risk of key compromise, making it easier for teams to secure their software supply chain. By simplifying the signing process, it allows developers to focus on building rather than managing security credentials.

Code examples

Bash
$ cosign sign gcr.io/user-vmtest2/demo
Bash
1$ cosign sign --identity-token=$(
2    gcloud auth print-identity-token \
3        --audiences=sigstore \
4        --include-email \
5        --impersonate-service-account my-sa@my-project.iam.gserviceaccount.com) \
6    gcr.io/user-vmtest2/demo
Bash
1$ cosign signing-config create \
2    --fulcio="url=https://fulcio.example.com,api-version=1,start-time=2024-01-01T00:00:00Z,operator=example.com" \
3    --rekor="url=https://rekor.example.com,api-version=2,start-time=2024-01-01T00:00:00Z,operator=example.com" \
4    --rekor-config="ANY" \
5    --tsa="url=https://tsa.example.com,api-version=1,start-time=2024-01-01T00:00:00Z,operator=example.com" \
6    --tsa-config="ANY" \
7    --output-file custom.signingconfig.json

When NOT to use this

The official docs don't call out specific anti-patterns here. Use your judgment based on your scale and requirements.

Want the complete reference?

Read official docs

Test what you just learned

Quiz questions written from this article

Take the quiz →

Get the daily digest

One email. 5 articles. Every morning.

No spam. Unsubscribe anytime.