Activate and configure Code Signing to help ensure the authenticity and integrity of your data.

Configuration overview

Code Signing requires an initial trust relationship between trusted and production instances that prevents any unauthorized user with any authorization level from accessing unapproved activities.

Refer to each topic to complete the configuration steps to establish the Circle of Trust with Code Signing:

Turn on Code Signing
Turn on Code Signing on your trusted instance to identify the trusted instances linking to your production instance.
Create Code Signing key pairs and certificates
Create two key pairs to signed certificates to establish trust between your production and trusted instances.
Load required key pairs and certificates for Code Signing
Establish the Circle of Trust relationship in a designated trusted instance using Code Signing. This first step loads a cryptographic key into the non-production environment to establish a trusted source for updates to the production instance.
Prepare Circle of Trust certificates
Create an update set in the trusted instance to export the trusted certificate to the production environment.
Import and install certificates for Circle of Trust
Retrieve the update set in production to establish the trust relationship between the two instances after the update set has been exported from the trusted environment. The certificates that have been created to represent trust in the trusted instance must be accepted into the production instance.
Specify custom rules in ECC firewall
Configure the External Communication Channel (ECC) firewall in your MID Server to create custom rules that allow or reject incoming messages selectively, and override the Code Signing configuration.