-
Story
-
Resolution: Done
-
High
-
None
-
None
1.6. About Confidential Containers
You can sign container images by using a tool such as Red Hat Trusted Artifact Signer. Then, you create a container image signature verification policy.
The Trustee Operator verifies the signatures, ensuring that only trusted and authenticated container images are deployed in your environment.
per Pradipta, "this appears disconnected and confusing, hence suggesting to delete it."
Consolidated the required changes in this doc - https://docs.google.com/document/d/1j1LvxHkJIisNSX57JkWoTwSGtKNLvKPbDiRkitswkXA/edit?tab=t.0