10.6. Summary

Signing code and using checksum and encryption algorithms is a vast topic, and we have just scratched the surface of it. You learned how signing files works, and how code origins and integrity are guaranteed in an inherently insecure medium such as the Internet. You also learned how to exchange keys and certificates and how to manage and configure the authorities whom we trust with verifying our signatures.

Using the tools demonstrated in this chapter, it is perfectly possible and feasible to set up your environment so that all production servers running PowerShell scripts require all scripts to be signed. Signing your scripts and requiring the use of signed scripts really does make your network bulletproof. In addition, signing ...

Get Pro Windows PowerShell now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.