Generate Microsoft SignTool Code Signing certificate on the CryptoHub
Perform the following tasks to create the Microsoft SignTool Code Signing certificate:
Perform the following steps to log in to the and go to the Certificate Management menu:
Open the web dashboard in a browser.
Log in under dual-control by using the administrator identities.
From the Service Management page, go to the Administrative Services tab.
Select PKI Management > Certificate Management.
Perform the following steps to create a new X.509 certificate container:
Select [ Add CA ] at the bottom of the page or right-click anywhere in the window and select Add CA.
In the pop-up menu, specify the following information for the certificate container:
- Name: Microsoft SignTool
- Host: None
- Type: X.509
- Owner Group: In the drop-down, select the Microsoft SignTool role.
Select [ OK ].
Before generating the Code Signing certificate for Microsoft SignTool, you must first perform the following steps to generate a root CA certificate:
Right-click the X.509 certificate container you created and select Add Certificate > New Certificate.
In the Subject DN tab of the certificate creation wizard, select the Classic preset in the drop-down menu and specify Root as the Common Name for the certificate.
In the Basic Info tab, you can leave the default values set.
In the V3 Extensions tab, select the Certificate Authority Profile in the drop-down list.
Select [ OK ] to finish creating the root CA certificate.
Perform the following steps to issue a Code Signing certificate for Microsoft SignTool:
Right-click the root CA certificate and select Add Certificate > New Certificate.
In the Subject DN tab of the certificate creation wizard, select the Classic preset in the drop-down menu and specify MS SignTool as the Common Name for the certificate.
In the Basic Info tab, you can leave the default values set.
In the V3 Extensions tab, select the Code Signing Certificate profile in the drop-down list.
Select [ OK ] to finish creating the Microsoft SignTool Code Signing certificate.
Perform the following steps to create an approval group for PKI signing:
From the Service Management page, select the Administrative Services tab.
Select PKI Management > PKI Signing Approvals.
Select [ Add Approval Group ] at the bottom of the page or right-click anywhere in the window and select Add Approval Group.
Specify Microsoft SignTool as the Name for the approval group and select [ OK ].
Right-click the newly created approval group and select Permission.
In the first drop-down list, select the role automatically created for the Microsoft SignTool service you deployed, and select [ Add ].
In the Permission drop-down menu for the Microsoft SignTool role, select the Use permission.
Select [ Save ].
Perform the following steps to add an issuance policy to the MS SignTool Code Signing certificate:
From the Service Management page, select the Administrative Services tab.
Select PKI Management > Certificate Management.
Expand the view for the Microsoft SignTool certificate container by selecting the plus (+) icons to show both the Root and MS SignTool certificates.
Right-click the MS SignTool certificate and select Issuance Policy > Add.
In the Basic Info tab, set:
- Approvals: 0
- A later step configures Anonymous signing after adding the issuance policy, so don't worry about the following displayed warning message: Zero approval policy requires Anonymous Signing security usage.
- Allowed hashes: SHA-256
In the X.509 tab, set the Default approval group to Microsoft SignTool.
In the Object Signing tab, select the Allow object signing checkbox.
Select [ OK ] to apply the issuance policy to the Microsoft SignTool certificate.
Right-click the MS SignTool certificate and select Change Security Usage.
In the Security Usage drop-down menu, select Anonymous Signing.
Select [ OK ] to apply the change.
Perform the following steps to assign the MS SignTool private key a name:
From the Service Management page, go to the Administrative Services tab.
Select Key Management > Key Database.
In the Keys section, you should see the MS SignTool key pair. Right-click the MS SignTool key pair and select Edit.
Enter MS SignTool in the Name field and select [ OK ] to save the changes.
Perform the following steps to grant Microsoft SignTool role permissions to use the private key:
Enter MS SignTool in the Name field and select [ OK ] to save the changes.
Select Key Management > Key Database.
In the Keys section, right-click the MS SignTool key pair and select Permission.
In the drop-down menu, select the Microsoft SignTool role and select [ Add ].
Select the Permission drop-down option for the Microsoft SignTool role and grant the Use permission.
Select [ Save ].
Perform the following steps to export the Microsoft SignTool and root CA certificates:
From the Service Management page, go to the Administrative Services tab.
Select PKI Management > Certificate Management.
Expand the view for the Microsoft SignTool certificate container by selecting the plus (+) icons twice to show both the Root and MS SignTool certificates.
Right-click the Root certificate and select Export > Certificate(s).
Change the encoding to PEM and select [ Browse ].
Choose a file name for web transfer and select [ OK ].
Select [ OK ] to initiate the export and download the file when prompted by your browser.
Right-click the MS SignTool certificate and select Export > Certificate(s).
Change the encoding to PEM and select [ Browse ].
Choose a file name for web transfer and select [ OK ].
Select [ OK ] to initiate the export and download the file when prompted by your browser.
You must copy the Microsoft SignTool and root CA certificates to the Windows machine where you deployed the integration.