Breadcrumb

  1. Red Hat Interactive Learning Portal
  2. Securing the Software Supply Chain with Jenkins, TAS, and TPA: A Red Hat Approach
  3. Additional resources

Securing the Software Supply Chain with Jenkins, TAS, and TPA: A Red Hat Approach

In this learning exercise, you will learn how to secure your Jenkins pipeline with Red Hat Trusted Artifact Signer and Red Hat Trusted Profile Analyzer.