Issue C2PA claim signing certificates
To perform this action, you must have a user role that contains the Solution administrator permission.
This topic explains how to configure DigiCert® Device Trust Manager and DigiCert CertCentral® to issue C2PA claim signing certificates and use them to sign and validate content.
C2PA (Coalition for Content Provenance and Authenticity) is an open technical standard that embeds tamper-evident provenance metadata—called Content Credentials—into digital assets such as images and videos. It defines a framework for recording how content was created, edited, and verified, enabling consumers and platforms to distinguish authentic media from manipulated or AI-generated content.
For full specifications and tools, see:
Adding C2PA support to cameras gives manufacturers a strong competitive advantage. It allows them to embed secure, tamper-evident provenance the moment an image is captured—something only the camera hardware can provide.
Device Trust Manager supports issuing C2PA level 1 claim signing certificates, allowing manufacturers to integrate Content Credentials into camera and video devices.
Benefits
C2PA certificate issuance: Issue enterprise-grade C2PA level 1 claim signing certificates that embed signed authenticity data into images and videos.
On-camera signing: Store the certificate and private key on the device. Signing occurs locally; no cloud service is required.
Global trust infrastructure: DigiCert's C2PA root certificates are included in official C2PA Trust Lists, enabling instant recognition and immediate verification.
Custom PKI integration: Integrate with Device Trust Manager without changing your camera manufacturing process. It supports all major issuance protocols (EST, SCEP, ACME, CMPv2, or REST, so it fits seamlessly into your existing workflows.
Trusted timestamp authority: Add verifiable timestamps using DigiCert’s C2PA-compliant TSA.
Before you begin
Set up your account for C2PA: Contact your DigiCert account representative to set up your account for C2PA claim‑signing certificate issuance
List your device in the C2PA Conforming Products List: Your device must be listed on the C2PA Conforming Products List before DigiCert can issue a C2PA claim‑signing certificate. For details, see C2PA Conformance Program
Complete organizational validation: DigiCert must validate your organization, including verification that your device appears on the C2PA Conforming Products List
Important
The organization name you submit to C2PA must exactly match the legal name registered with the government in your organization’s home country. DigiCert must confirm that your organization is officially registered and in good standing before issuing C2PA certificates that include your organization name.
Provision required certificate authorities: A DigiCert system administrator will add the RSA or ECC DigiCert Roots for C2PA and the DigiCert L1 Claim Signing ICAs for C2PA to your account. These are registered on the C2PA Trust List
Review key Device Trust Manager concepts: Ensure you’re familiar with:
If you are missing any of the above, contact your DigiCert account representative or DigiCert support.
Configure CertCentral and Device Trust Manager to issue C2PA certificates
Perform the following steps to configure CertCentral and Device Trust Manager to issue C2PA claim signing certificates.
Step 1: Set up CertCentral
Sign in to CertCentral.
If you don’t have a CertCentral account, create one using https://www.digicert.com/account/signup/standard/
In CertCentral, in the left main menu, go to Certificates > Organizations.
Create a new organization or edit an existing one.
Save the organization details.
Note
Ensure the organization details you provide in CertCentral exactly matches the information registered in the C2PA Conforming Products List.
In CertCentral, in the left main menu, go to Certificates > Organizations.
Open the organization and select Submit for organization validation:
Enable the C2PA-C2PA Organization Validation checkbox.
Select your generator product (synchronized daily from the C2PA Conforming Products List).
Important
You cannot submit your organization for C2PA validation unless the organization name in CertCentral exactly matches the name on the Conforming Products List.
Select Submit for Validation.
You will be notified when validation is complete. Once validation is complete, proceed to Step 2.
Step 2: Create a CertCentral API key
Sign in to DigiCert CertCentral®.
In CertCentral, in the left menu, go to Automation > API Keys.
On the API Keys page, select Add API Key.
In the Add API Key window, enter a Description for the API key and select Add.
The description could be the name of the app or the user you are linking the key to. For example, C2PA Connector Key.
In the User menu, link the API key to either a Service User or Users.
Leave the API key restrictions menu blank (None).
Select Add API Key.
In the New API Key window, copy the API Key.
Save the API key in a secure location.
Note
The API keys are shown only once, do not leave this page until you have copied the API Key and stored it in a secure location.
After saving the API key (or keys), select I understand I will not see this again.
Step 3: Create a CA connector for CertCentral in Device Trust Manager
Sign in to DigiCert ONE.
In the Managers () menu, select Device Trust.
In the Device Trust Manager menu, go to Integrations > CA connectors.
Select Create CA connector.
Provide a Nickname.
For example, C2PA Connector.
Tip
If your Device Trust Manager account requires more than one CA connector, give the CA connector a distinct and recognizable name so you can easily identify it when setting up certificate and enrollment profiles.
Optionally, provide a description.
For the CA source, select CertCentral API.
Enter your CertCentral API key that you obtained in Step 2.
Select Create CA connector.
Your newly created CA connector is listed under Integrations > CA connectors.
Step 4: Create a certificate profile and a certificate management policy
In the Device Trust Manager menu, go to Certificate management > Certificate settings > Certificate templates.
Select Create.
Select the CA connector template that you created as part of Step 3, and proceed to the Certificate profile creation section.
Tip
By default, the CA connector templates are grouped under CertCentral API. Use the Filter to select CertCentral API from the dropdown box.
Select Create certificate profile.
Enter a Name for the certificate profile.
For the CA connector certificate profile, select C2PA Generator from the dropdown list.
Select which divisions can use this certificate profile.
All divisions: The certificate profile is available for use by all divisions in the account, making it an account-wide profile.
Specific divisions: Select one or more divisions that should have access to the certificate profile. The profile will only be available to the chosen divisions.
Configure other parameters as needed. For example, you could customize the Signature algorithms, Certificate validity, and Renewal settings.
When done, select Next to proceed to the Advanced certificate profile settings section.
Under Advanced certificate profile settings, select the name of the organization.
Note
Only organization names that have been pre-validated for C2PA in your CertCentral account are listed.
Select the Registered Product ID.
Note
This list includes product IDs from the C2PA Conforming Products List that match the selected organization.
When done, select Next > Create and select to create the certificate profile and proceed to the Certificate management policy creation section.
Enter a Name for the certificate management policy.
Choose a Division to assign this certificate management policy.
For the Certificate management model, select Policy will be used for certificate issuance only. Requires an Essentials license.
Select Single certificate request through portal and REST API for the Certificate management methods.
When done, click Next to proceed to the Certificate settings section.
Verify the summary of the certificate profile settings you have selected.
When done, select Next > Create certificate management policy to create a certificate management policy.
Request a claim signing certificate
Important
The C2PA Certificate Policy prohibits the CA from generating private keys for claim signing certificates. You must generate the private key and submit a Certificate Signing Request (CSR).
In the Device Trust Manager menu, go to Certificate management > Certificates.
Select Certificate Actions > Request a certificate.
Under the Certificate management policy dropdown box, select the certificate management policy you have created earlier as part of Step 4.
Under the I have the keypair and will provide the CSR or public key in the request, upload a CSV file or a zipped CSV containing the required data.
When done, select Submit certificate request.
To generate an ECC P-256 key pair and CSR:
openssl ecparam -name prime256v1 -genkey -noout -out key.pem openssl req -new -key key.pem -out csr.pem
Important
Any values you include in your CSR (such as CN, O, C), and so on will be overridden by the certificate policy settings you have defined. This is intentional, to ensure your certificate complies with the C2PA Certificate Policy.
Key details:
Subject Name: The
C(Country),O(Organization), andCN(Common Name) will match the CPL entry for your product.Key Usage:
digitalSignature
nonRepudiation
Extended Key Usage:
claimSigning
emailProtection or documentSigning
Certificate Policies:
Includes:
1.3.6.1.4.1.62558.1.11.3.6.1.4.1.62558.3is set to:1.3.6.1.4.1.62558.101.3.6.1.4.1.62558.4is set to the Record ID (UUID) from your product’s CPL entry
Sign and validate the Image
Sign the image
Use the C2PA tool (or your own tool) to sign the image with the claim signing certificate issued by DigiCert.
Validate the image
Upload the signed image to C2PA Verify to confirm that the signature is valid.
FAQs
Are there API limits for requesting C2PA certificates?
Device Trust Manager: No API limits
CertCentral: API rate limits apply per API key:
100 requests per 5 seconds (burst limit)
1000 requests per 3 minutes (rolling window)
For more details, see Rate Limits.