This documentation is for a release that is no longer maintained
See documentation for the latest supported version.Setting up Jenkins for security integrations
Red Hat Trusted Application Pipeline 1.3
Learn how to configure Jenkins for secure CI/CD workflows.
Abstract
This document provides instructions on setting up Jenkins to perform essential security tasks, such as vulnerability scanning, image signing, and attestation generation.