Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion docs/sources/reference/api/image_signing_spec.md
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@ As Docker application packaging becomes mainstream users need to ensure that the
1. **Verify offline:** Data integrity verification may be performed without connection to Internet.
1. **Remote assembly:** Image layers may be safely pulled from multiple issuers when assembling application layers.
1. **Inspect image assembly:** An application may be inspected to determine how it was assembled and who assembled each layer.
1. **Arbitrary metadata support:** Authors or maintainers may add arbirary metadata describing the applicatation to support their unique needs.
1. **Arbitrary metadata support:** Authors or maintainers may add arbitrary metadata describing the applicatation to support their unique needs.
1. **Application certification support:** Provide mechanism for a certifying party to certify applications built by independent software vendors (ISVs).
1. **Apply Chain of trust model:** In the same way that a signed certificate can be traced to a trusted root CA issuer, layer ancestry built on a series of signed and trusted layers can be trusted.
1. **Retain simplicity:** The signing model should be transparent to the end-user and straightforward for the maintainer. Provide tools to dive deep if information is desired. Otherwise, users are able to easily build images and securly pull images without excessive security burdens.
Expand Down