Fulcio uses OIDC tokens to authenticate requests. Subject-related claims from the OIDC token are extracted and included in issued certificates.
Sigstore runs a federated OIDC identity provider, Dex. Users authenticate to their preferred identity provider and Dex creates an OIDC token with claims from the original OIDC token. Fulcio also supports OIDC tokens from additional configured issuers.
To add a new OIDC issuer:
- Add the new issuer to the configuration.
- Attention: If your issuer is for a CI provider, you should set the
type
asci-provider
and set the fieldci-provider
with the name of your provider. You should also fill theci-issuer-metadata
with thedefault-template-values
,extension-templates
andsubject-alternative-name-template
, following the pattern defined on the example. - Important notes: The
extension-templates
and thesubject-alternative-name-template
follows the templates pattern. The name used to fill theci-provider
field has to be the same used as key forci-issuer-metadata
, we suggest to use a variable for this. If you set adefault-template-value
with the same name of a claim key, the claimed value will have priority over the default one.
- Attention: If your issuer is for a CI provider, you should set the
- If your issuer is not for a CI provider, you need to follow the next steps:
- Add the new issuer to the
identity
folder (example). You will define anIssuer
type and a way to map the token to the certificate extensions. - Define a constant with the issuer type name in the configuration, add update the tests
- Map the issuer type to the token claim that will be signed over when requesting a token here. You can likely just use
sub
. - Add a case statement to map the issuer constant to the issuer type you created here
- Add the new issuer to the
- These next steps are required only for non-ci issuers, as it is already tested for generically. Although, you are welcome to add tests for your provider if you want to.
- Update the end-to-end gRPC tests:
- Update the configuration test
- Add a test for the new issuer (example)
- Update the end-to-end gRPC tests:
See this example, although it is out of date as you'll now need to create an issuer type.
SANs are important for users to describe identities across platforms. They are used in verification policies as the primary identifier for a workload.
Unfortunately there's no one size fits all answer for how to pick the best SAN to use for your service. To help, here are a few things to consider when making this choice:
-
How will users want to query / write policy for artifacts?
Consider what resource(s) users will want to query against. How would they distinguish resources between different teams? Production vs staging?
💡 Litmus test: what value is appropriate for
cosign verify --certificate-identity=<?>
-
What's the most-specific identifier that can describe the workload?
Choosing a SAN is often similar to figuring out what service account your workloads should have. Too broad, you may give unintended access to workloads that don't need it. Too narrow, and you end up having to manage the same permissions across multiple accounts.
-
Will the identifier change per-instance?
Identifiers that are based on UUIDs and can change each instance do not make good SANs. They tend to be too narrow and make it difficult to write a policy that will work consistently. If you need to reach for a regex for most policies, your SAN is probably too specific.
-
Can the identifier collide with other resources?
SANs should be unique for the issuer. Resources should not have the ability to use or craft a SAN of another resource.
-
Is the identifier well-defined?
All SANs for a provider should be defined and documented. If an issuer has the ability to produce different SANs, differences and conditions for these SANs should be documented.
GitHub Actions uses the job_workflow_ref
as its SAN. This has a few nice
properties when working with GitHub Actions:
- It's tied to a particular Job in a workflow.
- It can identify reusable workflows for common shared behavior, so multiple teams relying on the same reusable workflow can also share policies.
- The ref included can be used to verify it's coming from the expected location and not a branch.
To understand some of the considerations, below are some reasons for why values were not used as the SAN:
-
GitHub Repository
Example:
https://github.com/foo/bar
Too broad - this could apply to any GitHub Action in the repo (even potentially from pull requests).
-
Example:
repo:foo/bar:ref:refs/heads/main
Slightly too broad - the most specific you can get with a GitHub Subject is the event type + ref. Users may want to distinguish between different workflows.
-
GitHub Action Job ID
Example:
https://github.com/foo/bar/repo/actions/runs/4725056848/jobs/8382992120
Too narrow.
Every GitHub Action has a unique job id that it can use to uniquely identify each run of a Job.
While this gives you a specific identifier, it is not stable and changes for every run. Most users would likely reach for a policy that matches a broader set of jobs
https://github.com/org/repo/.*
, which makes it impractical to use as a specific identifier. -
GitHub Workflow Ref
Example:
foo/bar/.github/workflows/my-workflow.yml@refs/heads/main
Slightly too narrow.
Workflows are the entrypoints to GitHub Actions - they define the trigger conditions and configuration for what will run.
Workflows may end up using the same underlying job configuration with some minor tweaks (e.g. permissions, inputs, etc) by using reusable Workflows. Instead of requiring different policies for each workflow that modify how the same reusable workflow is invoked, the job_workflow_ref is used instead to allow users to centralize these policies under the same SAN.
Email-based OIDC providers use the user's email as the subject of the certificate.
- Dex (
oauth2.sigstore.dev/auth
)- GitHub (Note that this is the email of the user, not the GitHub username)
- Microsoft
- Google (
accounts.google.com
)
GitHub supports OIDC tokens for its workflows initiated from GitHub Actions. This removes the need for persisting authentication credentials. OIDC tokens include information about the workflow and source repository.
- GitHub Actions (
token.actions.githubusercontent.com
)
SPIFFE-based OIDC providers use a SPIFFE ID as the URI subject alternative name of the certificate, scoped to a domain.
Cloud-based Kubernetes instances can authenticate using OIDC tokens per cluster.
- AWS
- Azure
- Google Cloud
Certificate background: Identities for a certificate are included in the subject alternative name (SAN) field. Fulcio includes email addresses and URIs in the SAN field.
OIDC token: OIDC tokens are JWTs. At a minimum, all tokens must include the following claims:
- Audience (
aud
), set to "sigstore" - Issuer (
iss
), set to one of the URIs in the Fulcio configuration - Expiration (
exp
) - Issued At (
iat
)
For example, iss
could be https://oauth2.sigstore.dev/auth
or https://token.actions.githubusercontent.com
.
{
"aud": "sigstore",
"iss": "<uri>",
"exp": "<timestamp>",
"iat": "<timestamp>"
}
If the issuer is in a different claim than iss
, then you can include IssuerClaim
in the Fulcio OIDC configuration to specify the JSON path to the issuer.
In addition to the standard JWT claims, the token must include the following claims:
{
"email_verified": true,
"email": "[email protected]"
}
email
is extracted and included as a SAN email address.
The token must include the following claims:
{
"job_workflow_ref": "octo-org/octo-automation/.github/workflows/oidc.yml@refs/heads/main",
"sha": "example-sha",
"event_name": "workflow_dispatch",
"repository": "octo-org/octo-repo",
"workflow": "example-workflow",
"ref": "refs/heads/main",
}
job_workflow_ref
is included as a SAN URI: https://github.com/{job_workflow_ref}
All other required claims are extracted and included in custom OID fields, as documented in OID Information.
The token must include the following claims:
{
"namespace_id": "72",
"namespace_path": "my-group",
"project_id": "20",
"project_path": "my-group/my-project",
"pipeline_id": "574",
"pipeline_source": "push",
"job_id": "302",
"ref": "main",
"ref_type": "branch",
"runner_id": 1,
"runner_environment": "gitlab-hosted",
"sha": "714a629c0b401fdce83e847fc9589983fc6f46bc",
"project_visibility": "public",
"ci_config_ref_uri": "gitlab.com/my-group/my-project//.gitlab-ci.yml@refs/heads/main"
}
ci_config_ref_uri
is included as a SAN URI: https://{ci_config_ref_uri}
All other required claims are extracted and included in custom OID fields, as documented in OID Information.
The token must include the following claims:
{
"sub": "spiffe://foo.example.com"
}
The configuration must include SPIFFETrustDomain
, for example example.com
. Tokens must conform to the following:
- The trust domain of the configuration and hostname of
sub
must match exactly.
sub
is included as a SAN URI.
The token must include the following claims:
{
"kubernetes.io": {
"namespace": "default",
"pod": {
"name": "oidc-test",
"uid": "49ad3572-b3dd-43a6-8d77-5858d3660275"
},
"serviceaccount": {
"name": "default",
"uid": "f5720c1d-e152-4356-a897-11b07aff165d"
}
}
}
These claims are used to form the SAN URI of the certificate: https://kubernetes.io/namespaces/{claims.kubernetes.namespace}/serviceaccounts/{claims.kubernetes.serviceAccount.name}
The token must include the following claims:
{
"sub": "https://example.com/users/1"
}
Additionally, the configuration must include SubjectDomain
, for example https://example.com
. Tokens must conform to the following:
- The issuer in the configuration must partially match the domain in the configuration. The scheme, top level domain, and second level domain must match. The user who updates the Fulcio configuration must also have control over both the issuer and domain configuration fields (Verified either manually or through an ACME-style challenge).
- The domain of the configuration and hostname of the subject of the token must match exactly.
sub
is included as a SAN URI.
The token must include the following claims:
{
"sub": "exampleUsername"
}
Additionally, the configuration must include SubjectDomain
, for example example.com
. Tokens must conform to the following:
- The issuer in the configuration must partially match the domain in the configuration. The top level domain and second level domain must match. The user who updates the Fulcio configuration must also have control over both the issuer and domain configuration fields (Verified either manually or through an ACME-style challenge).
SubjectDomain
is appended to sub
to form an identity, sub!SubjectDomain
, and included as an OtherName SAN.
The token must include the following claims:
{
"sub": "organization:acme-inc:pipeline:super-duper-app:ref:refs/heads/main:commit:9f3182061f1e2cca4702c368cbc039b7dc9d4485:step:",
"organization_slug": "acme-inc",
"pipeline_slug": "super-duper-app"
}
These claims are used to form the SAN URI of the certificate: https://buildkite.com/acme-inc/super-duper-app
.