Skip to content

Signing Agent

The QCecuring Signing Agent enables secure local integration with native signing tools.

It provides a local IPC interface that:

  • Receives signing requests from PKCS#11 (Linux) or KSP (Windows)
  • Forwards digest signing requests to the QCecuring backend
  • Returns signatures securely to the calling application

The agent does not store private keys locally.

All signing operations are performed by the backend platform using secure key storage.


  • Windows (KSP integration)
  • Linux (PKCS#11 integration)

  • Java 21 or later
  • Network access to QCecuring backend
  • Platform API user credentials or mTLS certificate (production)

Terminal window
java -jar code-signing-agent.jar

When started successfully, the agent:

  • Creates a local IPC endpoint
  • Connects to the backend platform
  • Registers availability

Code Signing Agent


The agent can be configured via:

  • agent.properties
  • Environment variables

backend.url=http://localhost:8080
# IPC settings (platform default values typically sufficient)
# Optional authentication
# QCECURING_API_USERNAME=
# QCECURING_API_PASSWORD=
# Optional mTLS (recommended for production)
backend.mtls.client-cert-path=
backend.mtls.client-cert-password=
backend.mtls.ca-cert-path=
logging.level=INFO

Terminal window
export BACKEND_URL=http://localhost:8080
export QCECURING_API_USERNAME=admin
export QCECURING_API_PASSWORD=strong_password

In production environments, credentials and certificates should be provided using secure secrets management mechanisms.


The agent can be installed as a Windows service using a service manager such as NSSM.

Once installed, manage using:

Terminal window
Start-Service QCecuring-Code-Signing-Agent
Stop-Service QCecuring-Code-Signing-Agent
Get-Service QCecuring-Code-Signing-Agent

Install as a systemd service and manage using:

Terminal window
sudo systemctl start qcecuring-agent
sudo systemctl status qcecuring-agent
sudo systemctl enable qcecuring-agent

  • The Windows KSP connects to the local agent.
  • The agent forwards signing requests securely to the backend.
  • The backend performs signing using secure key storage.

  • The PKCS#11 provider connects to the local Unix socket.
  • The agent forwards signing requests securely to the backend.
  • The backend performs signing using secure key storage.

To verify the agent is running:

  • Ensure the process is active
  • Confirm the backend dashboard shows the agent as online
  • Test signing using jarsigner or signtool