Get started with Red Hat Trusted Artifact Signer
Enables cryptographic signing, verification of software, and provenance metadata.
Featured learning paths
Learning Path
Install Red Hat Trusted Artifact Signer using Google identity provider and Cosign
Learn how to install the Red Hat Trusted Artifact Signer using Google...
Learning Path
Sign and Verify Artifacts with GitHub identity provider and Red Hat Trusted...
In this learning exercise, we'll set up the ability to sign and verify...
Learning Path
Integrate Red Hat Trusted Artifact Signer with GitHub Actions
In this learning exercise, we'll learn how to automate the signing and...
Learning Path
Securing the Software Supply Chain with Jenkins, TAS, and TPA: A Red Hat Approach
In this learning exercise, you will learn how to secure your Jenkins pipeline...
Latest blogs & articles
Blog
Sep 26, 2024
Establishing software supply chain security: Jenkins with Red Hat Trusted Artifact...
As cyber threats become increasingly sophisticated, organizations need...
Blog
Jul 17, 2024
Red Hat Trusted Application Pipeline - 1.0.2 Maintenance Release
1.0.2 Maintenance Release Announcement In case you were wondering why...
Article
Apr 18, 2024
Red Hat Trusted Software Supply Chain is now available
Discover how Red Hat Trusted Software Supply Chain makes it easier to create,...
Article
Jul 18, 2023
An introduction to Red Hat Trusted Application Pipeline
Discover more about Red Hat Trusted Application Pipeline, a secure and easy...