Skip to main content

How Trustary Works

Trustary sits at the center of the container delivery pipeline, acting as a secure control plane for container images and artifacts.

Images are pushed to Trustary as part of the CI/CD process, where they are immediately stored inside project-based repositories. Access to these repositories is governed by role-based access control (RBAC), ensuring only authorized users and systems can interact with them.

Once images are available, Trustary applies policy-driven workflows such as vulnerability scanning, replication, and retention. Images can be automatically scanned for security issues, replicated across internal or external registries, and managed without disrupting ongoing development or deployment workflows.

Trustary integrates seamlessly with enterprise identity providers (LDAP/AD and OIDC), enabling single sign-on and centralized identity management. Operational tasks such as scanning, replication, and cleanup are handled asynchronously through the Job Service, ensuring high performance and reliability at scale.


Working of Trustary