SignTool (Windows)

Use QCecuring with Microsoft SignTool to secure and standardize code signing for Windows binaries and installers.

View docs Signtool

Overview

QCecuring integrates with Microsoft SignTool to centralize key material and policies used to sign Windows executables, drivers, and installers. This protects high-value signing keys and creates a consistent, auditable process for releasing Windows software.

Key capabilities

  • Central storage and protection of Windows code-signing certificates and keys.
  • Policy enforcement for which projects and pipelines can use specific signing identities.
  • Audit trails for every SignTool invocation brokered through QCecuring.
  • Support for integrating with existing build and release pipelines that already call SignTool.

Typical use cases

  • Software vendors and internal teams shipping Windows desktop or server applications.
  • Organizations preparing for stricter code-signing governance and compliance requirements.
  • Environments where multiple teams currently manage their own ad-hoc signing keys.

High-level integration flow

  1. Import or generate Windows code-signing certificates and keys into QCecuring under hardware-backed or hardened storage.
  2. Configure SignTool integration profiles referenced by CI/CD jobs and build scripts.
  3. Pipelines request signing operations through QCecuring, which controls access to keys and orchestrates SignTool usage.
  4. Signing events, including hashes, timestamps, and subjects, are logged for later review.
  5. Keys can be rotated, revoked, or re-assigned centrally without rewriting every build configuration.