Secure your automation with container signing
Add an extra layer of security to your content by enabling container signing in private automation hub.
Deploy your system for container signing Copy linkLink copied!
For added security, set up your system for container signing.
Before you begin Copy linkLink copied!
Automation content collection and container signing must be enabled.
About this task Copy linkLink copied!
Note that installer looks for the script and key on the same server where installer is located.
Procedure Copy linkLink copied!
Results Copy linkLink copied!
Ensure that you have a key titled container-default, or container-anyname.
Add and sign an execution environment Copy linkLink copied!
Push a signed execution environment to your private automation hub for added security.
Procedure Copy linkLink copied!
- From the navigation panel, select .
- Click and enter the relevant information in the fields that appear.
- The Name field displays the name of the execution environment on your local registry.
- The Upstream name field is the name of the image on the remote server.
- Under Registry, select the name of the registry from the drop-down menu.
- Optional: Enter tags in the Add tag(s) to include field. If the field is blank, all the tags are passed. You must specify which repository-specific tags to pass.
- Optional: Enter tags to exclude in the Add tag(s) to exclude field.
- Click . You should see your new execution environment in the list that appears.
- Sync and sign your new automation execution environment.
- Click the icon ⋮ and select Sync execution environment.
- Click the icon ⋮ and select Sign execution environment.
- Click on your new execution environment. On the Details page, find the Signed label to determine that your execution environment has been signed.
Push a signed execution environment from your local system Copy linkLink copied!
Sign an automation execution environment on a local system and push the signed execution environment to the automation hub registry.
Procedure Copy linkLink copied!
Results Copy linkLink copied!
After the execution environment is signed, the status changes to "signed".
The details page for each execution environment indicates whether it has been signed. If the details page indicates that an image is Unsigned, you can sign the execution environment from automation hub using the following steps:
- Click the execution environment name to navigate to the details page.
- Click the icon ⋮. Three options are available:
- Sign execution environment
- Use in Controller
- Delete execution environment
- Click Sign execution environment from the drop-down menu.
Confirm signatures are on your local environment Copy linkLink copied!
Podman and other image clients can use policies to ensure the validity of an image. To enable this capability, assign a policy to the signature.
About this task Copy linkLink copied!
To ensure an execution environment is signed by specific signatures, the signatures must first be on your local environment.
Procedure Copy linkLink copied!
- From the navigation panel, select .
- Click the icon next to the signature that you are using. A new window should open to indicate you have downloaded the key.
Configure a client to verify signatures Copy linkLink copied!
To ensure an execution environment pulled from the remote registry is properly signed, first configure the execution environment with the proper public key in a policy file.
Before you begin Copy linkLink copied!
- The client must have sudo privileges configured to verify signatures.
Procedure Copy linkLink copied!
Results Copy linkLink copied!
- Pull the file using Podman, or your client of choice:
podman pull <server-address>/<container-name>:<tag name> --tls-verify=false
This response verifies the execution environment has been signed with no errors. If the execution environment is not signed, the command fails.