fulcio
certificate authority for keyless code signing
TLDR
SYNOPSIS
fulcio command [options]
DESCRIPTION
Fulcio is a certificate authority for code signing, part of the Sigstore project. It issues short-lived certificates tied to OIDC identities (GitHub, Google, Microsoft), enabling keyless code signing.Fulcio eliminates the need for developers to manage long-term signing keys. Certificates are logged in the transparency log (Rekor) for verification.
PARAMETERS
serve
Start Fulcio server.--ca type
Certificate authority type: googleca, fileca, kmsca, tinkca, pkcs11ca, ephemeralca.--config-path file
Path to Fulcio config YAML (default: /etc/fulcio-config/config.yaml).--host addr
HTTP server listen address (default: 0.0.0.0).--port num
HTTP server port (default: 8080).--grpc-port num
gRPC server port (default: 8081).--fileca-cert file
Path to CA certificate (fileca only).--fileca-key file
Path to CA encrypted private key (fileca only).--ct-log-url url
Certificate transparency log URL.version
Show version.
CONFIGURATION
/etc/fulcio-config/config.yaml
Server configuration including OIDC provider settings, certificate policies, and CA parameters.
WORKFLOW
2. Fulcio issues short-lived certificate
3. Developer signs artifact
4. Signature logged in Rekor
5. Verifier checks Rekor and certificate chain
CAVEATS
Requires OIDC provider integration. Certificates are short-lived by design. Production requires proper CA management. Part of larger Sigstore ecosystem.
HISTORY
Fulcio is part of Sigstore, initiated by Google, Red Hat, and Purdue University in 2021 to make code signing accessible. Named after a Roman consul, it provides the CA component of the keyless signing infrastructure.
