Skip to content

Digitally Sign Packages — Code Signing

Digitally signing your package ensures end users that the code has not been tampered with. Based on Microsoft Authenticode, digital signing verifies the source and integrity of your installer.

Digitally Sign Your Package in Paquet Builder

End users see a certificate indicating the software’s origin and authenticity, reducing security warnings:

Signed package dialog

PFX / Certificate Store

Use a .pfx file or a certificate installed in the Windows Certificate Store. Paquet Builder signs with the built-in GSignCode utility.

Hardware token

Connect your HSM or USB token containing the private key. GSignCode adapts automatically, including ECC support.

You need a valid code signing certificate from a trusted Certificate Authority (CA) such as Sectigo or Digicert. Alternatively, Azure Artifact Signing offers a much cheaper pay-as-you-go model — see the dedicated topic.

Specify the path to your .pfx file and its password. To create a PFX from separate key files:

Terminal window
pvk2pfx.exe -pvk MyPrivateKey.pvk -spc MyPublicKey.cer -pfx MyPFX.pfx -po your_password
AlgorithmDescription
SHA-256Default and recommended standard
Dual signingCombines SHA-256 and SHA-1 for backward compatibility with Windows XP/Vista

Integrity check at startup

Forces a mandatory signature validation by the OS. Unsigned files will fail to execute.

Timestamp

Ensures the signature does not expire. Configure Authenticode and RFC-3161 timestamp servers in Environment Options.

Sign the uninstaller

Signs the uninstaller EXE file. Highly recommended.

Sign internal DLLs

Signs internal runtime libraries used temporarily by your package.