Code Signing for Windows 7, 8 and 10

Code Signing for Windows 7, 8 and 10

Introduction

This article will be the default article after the implementation of
the new Minimum Requirements for Code Signing on February 1, 2017.

Prerequisites

Important SignTool Options

  • /ac  -  Specify an Additional Certificate.
  • /a  -  Automatically selects the best certificate to sign the file from your  Windows Certificate Store.
  • /n "Certificate Common Name" Specifies the certificate to sign the file from your Windows Certificate Store using the certificate common name.
  • /fd SHA256  -  Specify the file digest algorithm used in creating file signatures.
  • /t  -  Specify a Microsoft Authenticode compatible time stamp server.
  • /tr  -  Specify an RFC 3161 compliant trusted time stamp server.*Recommended*
  • /td SHA256  -  Must be called after "/tr", this command specifies the TimeStamp digest Algorithm. *Recommended*
  • /sha1 Hash  - Used to select the signing certificate by the SHA-1 Hash (Thumbprint).                                 

Note: Timestamping your Code is extremely important and is highly recommended for every piece of code that you sign. 
This timestamp will allow the file that you sign to remain valid long after the certificate itself has expired.

TimeStamp URLs:
SHA-1 based: http://rfc3161timestamp.globalsign.com/standard
SHA-2 based: http://rfc3161timestamp.globalsign.com/advanced

Procedure

  1. You can either sign files out of a working directory, or you can place them in your Windows SDK\bin folder.
  2. Open the Command Prompt: Windows 7: Start > Run > cmd, or for Windows 8 - 10, press the Windows Key, then type cmd and press enter.
  3. Navigate to the directory with signtool.exe.
  4. Use the following command to sign your file: 
    signtool sign /a /tr http://rfc3161timestamp.globalsign.com/advanced /td SHA256 c:/path/to/your/file.exe

    Note: For Kernel Driver Signing include the argument “/ac GlobalSign Root CA.crt” to the signtool command in order to complete the MS cross certificate chain. 
    sign /a /ac GlobalSign Root CA.crt /tr http://rfc3161timestamp.globalsign.com/advanced /td SHA256 c:/path/to/your/file.exe
  5. Enter your Token Password. If the signing is successful you will see a prompt informing you so.
  6. To verify the successful signature use the following commands:
    Authenticode: signtool verify /v /pa
    Kernel Driver Signing: signtool verify /v /kp

 You may also verify the signature within the properties of the file, under the Digital Signatures tab.

Related Articles

GlobalSign System Alerts

View recent system alerts.

View Alerts

Certificate Inventory Tool

Please click the button below to log in or sign up.

Log In - Sign Up

SSL Configuration Test

Check your certificate installation for SSL issues and vulnerabilities.