Skip to content

Commit

Permalink
Add scenario for user-specified key (#75)
Browse files Browse the repository at this point in the history
Signed-off-by: Marina Moore <[email protected]>
  • Loading branch information
mnm678 authored Jun 7, 2021
1 parent d04c49c commit d9e6c58
Showing 1 changed file with 12 additions and 0 deletions.
12 changes: 12 additions & 0 deletions scenarios.md
Original file line number Diff line number Diff line change
Expand Up @@ -250,6 +250,18 @@ A weakness is discovered in a widely used cryptographic algorithm and a decision
1. Key revocation, chain of trust, etc. must all work for the expected lifetime of a version of the client software while these changes are made.
1. The actions that different parties need to perform must be clearly articulated, along with the result of not performing those actions.


### Scenario #10: Specifying a trusted key

A user may want to trust an artifact only if it is signed by a specific key. Maybe this is an internally created artifact with a known signing key. This key may be distributed using a trusted third party mechanism.

1. The user obtains a trusted key for a particular artifact.
1. The user downloads and verifies the artifact using Notary v2 and their known key.

**Implications of this requirement**

1. Users must be allowed to configure specific trusted keys for specific artifacts or collections of artifacts.

## Open Discussions

* What is the relationship between a signature, an artifact and a registry?
Expand Down

0 comments on commit d9e6c58

Please sign in to comment.