Skip to content

Commit

Permalink
Implement first round of edits
Browse files Browse the repository at this point in the history
  • Loading branch information
pwelch committed Nov 30, 2023
1 parent 9c65e9e commit dab3973
Showing 1 changed file with 22 additions and 8 deletions.
30 changes: 22 additions & 8 deletions docs/new-idp-requirements.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,23 +4,37 @@

This document describes the minimum requirements for adding a new IDP (Identity Provider) to the Sigstore Public Good Deployment.

Adding a new IDP option to Fulcio helps drive adoption of signing and verification for software artifacts using Sigstore Public Good. Because identity is a critical component of the system, it's important that new IDPs meet the minimum set of requirements to ensure the security and reliability of the system.

You should also reference the [Fulcio - ODIC.md](https://github.com/sigstore/fulcio/blob/main/docs/oidc.md) documentation for additional requirements for the type of IDP you're looking to integrate. The current two likely types of IDPs are:

- `Email` - Email-based OIDC providers use the user’s email as the subject of the certificate.
- `Workflow` - Workflow-based OIDC providers are used with systems such as CI/CD pipelines. These providers will require more onboarding and you should [file an issue](https://github.com/sigstore/fulcio/issues) to discuss the requirements for a specific system.

## Requirements

> The Sigstore Project reserves the right to remove your identity provider from the deployment if it is found to cause technical issues, does not meet the requirements outlined in this document, or if it is deemed to be a security risk to the system.
The key words "MUST", "MUST NOT", "SHOULD", "SHOULD NOT", and "MAY" in this document are
to be interpreted as described in [RFC 2119](https://www.ietf.org/rfc/rfc2119.txt).

A new IDP must meet the following requirements:

- MUST host a `/.well-known/openid-configuration` file.
- MUST have a documented key rotation policy.
- MUST have a documented signing key storage policy.
- MUST maintain an uptime requirement of `99.5%`.
- MUST challenge the email address as an OIDC provider.
- MUST prevent identity subject reuse.
- MUST host a `/.well-known/openid-configuration` file that conforms to the OpenID standard for this file.
- SHOULD have a documented key rotation policy.
- SHOULD have a plan in place for key rotation in the case of compromise.
- SHOULD have a documented signing key storage policy.
- MUST have a secure signing key.
- MUST maintain good uptime.
- SHOULD maintain an uptime requirement of `99.9%+`.
- MUST challenge the email address as an OIDC provider for email IDPs.
- MUST prevent identity subject reuse. This requirement is focused on immutable vs mutable identifiers. For example, a person could give up their GitHub username but the GitHub `user_id` would remain the same.
- MUST have a configurable audience (`aud`) for the token, setting the audience to `sigstore`.
- MUST provide a contact during initial configuration that can be used for outreach for issues.
- MUST support the following claims:
- `issuer`
- `subject`
- `audience`
- `issued at`
- `expiration`
- `iat` (issued at)
- `exp` (expiration)
- Other claims may be required (especially for CI providers). See [Fulcio - ODIC.md](https://github.com/sigstore/fulcio/blob/main/docs/oidc.md)

0 comments on commit dab3973

Please sign in to comment.