Skip to content

Commit 5a11019

Browse files
scjaneMisty Stanley-Jones
authored and
Misty Stanley-Jones
committed
Update trust_key_mng.md (#1883)
* Update trust_key_mng.md * Update trust_key_mng.md I don‘t know how the whitespace appears, and it seems that it appears because something happened related to its original format (right-aligned pipe characters) and my change. Still unknown. Now I've deleted some redundant whitespace. * Update I don‘t know how the whitespace appears, and it seems that it appears because something happened related to its original format (right-aligned pipe characters) and my change. Still unknown. Now I've deleted some redundant whitespace.
1 parent f83cc51 commit 5a11019

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

engine/security/trust/trust_key_mng.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,13 @@ title: Manage keys for content trust
77
Trust for an image tag is managed through the use of keys. Docker's content
88
trust makes use of five different types of keys:
99

10-
| Key | Description |
11-
|---------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------|
12-
| root key | Root of content trust for an image tag. When content trust is enabled, you create the root key once. Also known as the offline key, because it should be kept offline. |
13-
| targets | This key allows you to sign image tags, to manage delegations including delegated keys or permitted delegation paths. Also known as the repository key, since this key determines what tags can be signed into an image repository. |
14-
| snapshot | This key signs the current collection of image tags, preventing mix and match attacks.
15-
| timestamp | This key allows Docker image repositories to have freshness security guarantees without requiring periodic content refreshes on the client's side. |
16-
| delegation | Delegation keys are optional tagging keys and allow you to delegate signing image tags to other publishers without having to share your targets key. |
10+
| Key | Description |
11+
|:-----------|:----------- |
12+
| root key | Root of content trust for an image tag. When content trust is enabled, you create the root key once. Also known as the offline key, because it should be kept offline. |
13+
| targets | This key allows you to sign image tags, to manage delegations including delegated keys or permitted delegation paths. Also known as the repository key, since this key determines what tags can be signed into an image repository. |
14+
| snapshot | This key signs the current collection of image tags, preventing mix and match attacks. |
15+
| timestamp | This key allows Docker image repositories to have freshness security guarantees without requiring periodic content refreshes on the client's side. |
16+
| delegation | Delegation keys are optional tagging keys and allow you to delegate signing image tags to other publishers without having to share your targets key. |
1717

1818
When doing a `docker push` with Content Trust enabled for the first time, the
1919
root, targets, snapshot, and timestamp keys are generated automatically for
@@ -37,9 +37,9 @@ repositories created with newer versions of Docker.
3737
## Choosing a passphrase
3838

3939
The passphrases you chose for both the root key and your repository key should
40-
be randomly generated and stored in a password manager. Having the repository key
40+
be randomly generated and stored in a password manager. Having the repository key
4141
allows users to sign image tags on a repository. Passphrases are used to encrypt
42-
your keys at rest and ensures that a lost laptop or an unintended backup doesn't
42+
your keys at rest and ensure that a lost laptop or an unintended backup doesn't
4343
put the private key material at risk.
4444

4545
## Back up your keys

0 commit comments

Comments
 (0)