Red Hat Trusted Application Pipeline

Increases security in a continuous integration and continuous delivery (CI/CD) pipeline by continuously scanning for code integrity in builds and automates deployments using policy-driven controls as code. Auto-generated software bills of materials (SBOMs) for origin attest that trusted software components are consistent with Supply Chain Levels for Software Architects (SLSA) security standards before promoting the build.

About category

Empty state: Permission needed

Allison Wolfe

Permissions needed
Trusted Application Pipeline
User context

A user is trying to access a workspace they do not have permissions for and they come across this empty state.

Microcopy

“Ask the administrator or the owner of the crt-redhat-acm workspace for access permissions." CTA: “Go to Overview page”

Resources No resource available