Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.tensor9.com/llms.txt

Use this file to discover all available pages before exploring further.

Operations is a remote-execution surface running inside your customer’s own cloud account. This page documents the cryptography that makes it auditable: which keys exist, where they live, which transitions get signed, where signed evidence is preserved, and how anyone (you, your customer, an auditor) can verify the chain after the fact. Trust chain: customer pins their pub key to the appliance, the appliance signs every lifecycle transition with its own key, signed manifests mirror to the vendor control plane, anyone with the pinned pubkey can verify the chain after the fact.

The trust chain at a glance

Two Ed25519 keypairs anchor the system:
  • Your customer’s signing key, generated on your customer’s workstation when they first sign anything (a pre-approval, a release manifest). The private key lives in a local keychain on their workstation; the public key is pinned into the appliance’s secret store by a cloud-native write your customer runs in their own cloud account.
  • The appliance’s signing key, generated by the appliance the first time the install runs. The private key lives in the appliance’s secret store under your customer’s IAM (Tensor9 cannot read it). The public key is registered on the install record in your control plane so anyone can fetch it to verify signatures.
At every lifecycle transition that needs non-repudiation, the appliance signs canonical bytes with its key. The signed manifest is then mirrored to your control plane at sign time. Anyone with the appliance’s pinned pubkey can replay the verification later and prove what was signed, by whom, at what time.

What the three signatures prove

The lifecycle has three signature transitions. Each covers different bytes and proves a different fact.
SignatureSigned whenWhat bytes are coveredWhat it proves
commandApprovalYour customer approves the request in Step 1 of the approval UICanonical form of {cmdId, decision, at, approver, reason, sha256(rawCommand)}The exact command body and variable values were approved by this person at this time
outputIntegrityOutput capture finishes on the appliance, before encryptionCanonical form of {cmdId, executedAt, exitCode, sha256(stdout + stderr)} where stdout / stderr are the small [blob: bucket=..., key=..., size=..., sha256=...]\\n<presigned-url> payloads stored on the command recordThe blob-payload bytes the vendor reads on retrieve are the exact payloads the appliance produced. The payload’s embedded sha256 then binds the URL to the actual stream bytes, which the vendor independently re-verifies on curl.
outputApprovalYour customer releases output in Step 4Canonical form of {cmdId, decision, at, approver, reason, sha256(exitCode + stdout + stderr)} over the same payloadsThe release decision covers these specific blob-payload bytes (and, transitively via the embedded sha256, the actual stream bytes) and was made by this person at this time
All three signatures are Ed25519 and live on the command’s audit record in your control plane. They survive the encrypt/decrypt cycle: the integrity signature is computed over the plaintext payload before encryption, then preserved alongside the ciphertext metadata. The integrity guarantee chains:
  1. The appliance signs the cmd record’s stdout / stderr (the small blob-payload strings).
  2. Inside each payload, a sha256=<hex> field binds the presigned URL to specific bytes.
  3. When the customer or vendor fetches the URL and re-computes the sha256, any byte-level tamper between the appliance’s upload and the read is detected (the release script exits non-zero on mismatch; you can do the same client-side).
The signatures compose: a customer disputing “you ran something I didn’t approve” has to either repudiate commandApproval (which is signed against their pinned pubkey) or repudiate the pinning step itself (which they did with their own cloud credentials). Neither is plausible without their key material.

Where keys live

Your customer’s signing key

Your customer owns and stores their own private signing key. The support-portal approval UI handles the setup on first approval (the Set up your signing keypair step) and renders the bash snippets your customer pastes into their own terminal. Today the approval UI supports two storage backends, matched to the appliance environment:
  • AWS appliances: private key in your customer’s AWS SSM Parameter Store as a SecureString (KMS-encrypted at rest).
  • Kubernetes appliances: private key as a Kubernetes Secret in the cluster namespace.
The approval UI refuses to advance the setup step on other appliance environments today (GCP, Azure, DigitalOcean, on-prem). Support for those is on the roadmap.
PropertyValue
AlgorithmEd25519
Private keyLives in your customer’s own secret store: AWS SSM Parameter Store SecureString on AWS appliances, or a Kubernetes Secret on Kube appliances. The browser never touches the private key.
Public keyPinned to the appliance’s secret store at a path the appliance verifier reads on every poll. The approval UI’s “Pin the public key” snippet writes to the same backend (SSM or Kubernetes Secret) under a parallel path the appliance has IAM to read. See Standing pre-approvals for the exact paths.
How it gets thereOne-time per appliance: your customer opens any support link, the approval UI detects no pinned key, and walks them through three bash snippets they paste into their terminal: openssl genpkey -algorithm Ed25519 on their workstation to generate the keypair, an aws ssm put-parameter / kubectl create secret to store the private key, and a second put-parameter / create secret to pin the public key. The approval UI polls until the appliance reports the pubkey is visible, then advances.
Used to signPre-approval grant manifests and per-command approval / release manifests. Signing is local: the approval UI’s Step 5 / release snippets fetch the private key from your customer’s storage, sign the canonical bytes with openssl pkeyutl, and emit a base64 signature your customer pastes back into the approval UI.
RecoveryThe private key lives in your customer’s own SSM Parameter Store or Kubernetes Secret, so it survives workstation loss: any workstation with your customer’s cloud credentials can refetch it and resume signing. If the secret itself is deleted (e.g., your customer accidentally wipes the parameter), see “Lost-key recovery” in Standing pre-approvals.

The appliance’s signing key

PropertyValue
AlgorithmEd25519
Private keyLives in the appliance’s secret store under your customer’s IAM. Your control plane cannot read it; only the appliance process can.
Public keyRegistered on the install record in your control plane so both you and your customer can fetch it to verify signatures.
How it gets thereThe appliance generates the keypair when the install starts and writes the private key to its own vault before any ops command can run.
Used to signEvery commandApproval, outputIntegrity, and outputApproval transition the appliance acts on.
RecoveryLost only if the appliance is destroyed. A fresh install mints a new keypair and registers it on the install record (overwriting the previous pubkey slot). Signatures produced under the old key stop verifying once that overwrite happens; the install record keeps only the current pubkey, not a history. Plan for: if you need to verify old signatures across an appliance rebuild, archive the projection’s opsCmdPubKey before the rebuild.
The customer-side key proves the human signed (“I, the customer, approved this”); the appliance-side key proves the bytes were produced inside the appliance (“this output came out of the box at this time, not from elsewhere”). A customer signature without an appliance signature would prove approval but not provenance, and the reverse would prove production but not consent, so the audit chain requires both.

How non-repudiation survives revocation

Pre-approval involves two distinct artifacts stored in two distinct places. They serve different purposes and have different deletion properties.
ArtifactStored inPurposeCan your customer delete it?
Signed pre-approval manifestYour control plane (on the template lineage record)The non-repudiation evidence: the Ed25519-signed bytes plus the signer’s embedded pubkey + fingerprint. The appliance fetches it from your control plane at decide time to verify against the bx-pinned buyer-signing pubkey.No, your customer has no access to vendor infrastructure.
Revocation recordAppliance vault (your customer’s own cloud account)Drives runtime enforcement: the appliance reads the revocation list on every decide cycle and refuses to act on a manifest that’s been revoked. The revocation record carries no signature.Yes, this is how revocation works.
Revocation removes future enforcement but does not erase the historical signature. If your customer later claims “I never signed that pre-approval,” you produce the signed manifest from your control plane, the Ed25519 signature verifies against the embedded signer pubkey (with the fingerprint recorded inline on the manifest, in case the key has since been rotated), and the dispute resolves cryptographically. The non-repudiation property holds because the manifest lives where the customer can’t unilaterally erase it: vendor-side infrastructure. If the manifest lived on the appliance vault instead, customer-side deletion would be both revocation AND history-rewrite, and a customer could plausibly claim they never signed anything that the appliance briefly acted on.

Key rotation

Customers rotate their signing key for a few reasons: retiring a workstation, suspected compromise of the laptop holding the key, an employee with access leaving, or routine rotation per their own security policy. The mechanics:
  1. Generate a fresh keypair on the new workstation. Your customer opens any support link; the approval UI’s Step 2 setup detects no pinned key and walks them through openssl genpkey followed by the put-parameter / create secret snippets to store the private key and pin the public key.
  2. Pin the new pub key to the appliance using the same cloud-native command pattern as the initial pin. Your customer can pin alongside the old key or replace it.
  3. Decide what happens to the old key:
    • Leave it pinned. Pre-approvals signed by the old key keep auto-approving until they expire. New approvals get signed by the new key.
    • Unpin it. Every pre-approval signed by the old key immediately fails verification. Auto-approval reverts to manual for all of them.
Historical verification stays intact either way: your control plane records the signer’s pubkey fingerprint at sign time, so signatures on past commands continue to verify against the recorded fingerprint, not against whatever is pinned now. tensor9 ops command audit verify walks each record using the recorded fingerprint.

What revocation does and doesn’t do

Three distinct operations get called “revocation” loosely. They have different effects.
OperationWhat it doesWhat it does NOT do
Delete the appliance vault entry for one pre-approvalStops auto-approval for that pre-approval on the appliance’s next decide cycle (within seconds)Does not erase the signed manifest from your control plane. Does not affect other pre-approvals.
Delete the pinned customer pubkeyInvalidates every pre-approval signed by that key. Subsequent verification on the appliance fails closed; the cmd falls back to manual.Does not erase any history. Does not retroactively undo commands that already executed.
Reject a per-command approval (in the approval UI)Sets the command’s lifecycle to CmdRejected. The command never executes.Does not erase the (rejected) approval record from your control plane. A future audit can show the customer was offered the command and declined.
Across all three operations, revocation only blocks future enforcement; it does not rewrite history.

Independent verification

Both you and your customer can verify the full audit chain on a specific ops command:
tensor9 ops command audit verify \
  --appName my-app \
  --commandName check-myapp-disk
The action:
  1. Pulls the command record from your control plane.
  2. Fetches the appliance’s signing pubkey (recorded at sign time, so later key rotation does not invalidate older signatures).
  3. Reconstructs the canonical signed-data for each of the three signatures and verifies them against that pubkey.
  4. Exits zero if all signatures verify; non-zero on any failure.
Output in the healthy case names every check with [OK] and prints the appliance’s signer fingerprint at the top. Failures appear as [FAIL] with a one-line reason. For compliance pipelines that need to fail on legacy unsigned records (commands authored before the signature chain was required), pass --strict. For programmatic use, pass --output json and read the per-check signer fingerprints + signed-payload digests so the chain can be archived independently. A customer disputing “you ran something I didn’t approve” doesn’t have to take your word. They run tensor9 ops command audit verify themselves and the Ed25519 signatures either hold or they don’t.