Ce contenu n'est pas disponible dans la langue sélectionnée.
Chapter 2. Technologies Behind RHTAP
RHTAP integrates seamlessly with industry-leading platforms and tools to maintain security and efficiency:
| Component or Technology | Description |
|---|---|
| Red Hat Developer Hub (RHDH) | The self-service portal streamlines development and integrates security best practices from the start. |
| Red Hat Trusted Artifact Signer (RHTAS) | Enhances software integrity through signature and attestation, ensuring all artifacts are secure and authentic. |
| Red Hat Trusted Profile Analyzer (RHTPA) | Automates the creation and management of SBOMs, providing transparency and compliance in your software supply chain. |
| OpenShift | Utilizes the OpenShift Container Platform (OCP) for compute resources, offering a secure environment for the entire development lifecycle. |
| Quay | Quay serves as a secure container image repository, continuously scanning images for vulnerabilities and ensuring that your containerized applications remain secure throughout their lifecycle. |
| OpenShift GitOps | Manages Kubernetes deployments and infrastructure using Git repositories, ensuring consistent, automated, and secure deployment practices. |
| OpenShift Pipelines | Automates the CI/CD processes with visibility and control over build, test, and deployment workflows, accelerating your path to production while maintaining high-quality standards. |
| Argo CD | Automates and tracks application deployment and lifecycle management, ensuring consistent versions of app definitions, configurations, and environments. |