Synopsis Black Duck은 오픈소스 구성요소 사용을 제어하는 규칙을 만들 수 있게 해주는 오픈소스 관리 솔루션입니다.
Synopsis Black Duck GKE Binary Authorization 솔루션은 Black Duck 정책 규칙을 기준으로 Binary Authorization 증명을 만듭니다.
Digester는 태그를 이미지 다이제스트로 자동 변환하고 다이제스트를 Kubernetes 리소스에 추가하는 Google에서 개발된 오픈소스 도구입니다. Binary Authorization은 증명을 통해 이러한 다이제스트를 확인합니다. Digester는 Kubernetes 포드 및 포드 템플릿 사양에서 컨테이너 및 초기 컨테이너 이미지에 대해 태그를 변환합니다.
[[["이해하기 쉬움","easyToUnderstand","thumb-up"],["문제가 해결됨","solvedMyProblem","thumb-up"],["기타","otherUp","thumb-up"]],[["이해하기 어려움","hardToUnderstand","thumb-down"],["잘못된 정보 또는 샘플 코드","incorrectInformationOrSampleCode","thumb-down"],["필요한 정보/샘플이 없음","missingTheInformationSamplesINeed","thumb-down"],["번역 문제","translationIssue","thumb-down"],["기타","otherDown","thumb-down"]],["최종 업데이트: 2025-04-21(UTC)"],[[["\u003cp\u003eThis page lists third-party tools that integrate with Binary Authorization, including solutions for automating signing, managing open-source components, and continuous integration.\u003c/p\u003e\n"],["\u003cp\u003eBinx.io offers automation for signing based on vulnerability findings through the use of Terraform, Kritis Signer, and Cloud Run.\u003c/p\u003e\n"],["\u003cp\u003eSynopsis Black Duck allows the creation of Binary Authorization attestations based on open-source component policy rules.\u003c/p\u003e\n"],["\u003cp\u003eCloudBees CI and CircleCI both facilitate using Binary Authorization policies, with CloudBees CI managing Jenkins-based pipelines, and CircleCI serving as a CI platform for building and signing container images.\u003c/p\u003e\n"],["\u003cp\u003eDigester is a Google-developed tool that resolves image tags to digests, which are then matched by Binary Authorization to verify attestations.\u003c/p\u003e\n"]]],[],null,["# Integrate with third-party tools\n\nThis document lists third-party tool integrations with\n[Binary Authorization](/binary-authorization/docs/overview).\n\nSynopsis Black Duck\n-------------------\n\n**Synopsis Black Duck** is an open source management solution that enables you\nto create rules to govern your use of open source components.\nThe Synopsis Black Duck GKE Binary Authorization solution\ncreates Binary Authorization attestations based on Black Duck policy rules.\n\nView the [Synopsis Black Duck integration guide](https://synopsys.atlassian.net/wiki/spaces/PARTNERS/pages/72777811/Attesting+an+Image+Based+on+a+Black+Duck+Scan).\n\nCloudBees\n---------\n\n**CloudBees CI** is a continuous integration (CI) solution that manages\nJenkins-based CI pipelines. You can use CloudBees CI with Jenkins to build\nand sign container images and to create Binary Authorization attestations.\n\nView the [CloudBees Integration Guide](https://www.cloudbees.com/blog/ensure-application-compliance-cloudbees-core-and-binary-authorization-google-cloud-platform).\n\nCircleCI\n--------\n\n**CircleCI** is a CI platform. You can use CircleCI to set up\nBinary Authorization policies, create signing keys, build and sign container images,\nand create Binary Authorization attestations.\n\nView the [CircleCI integration guide](https://circleci.com/developer/orbs/orb/circleci/gcp-binary-authorization).\n\nDigester\n--------\n\n[Digester](https://github.com/google/k8s-digester)\nis a Google-developed open source tool that automatically resolves tags to\nimage digests and adds the digests to Kubernetes resources. Binary Authorization\nmatches these digests with attestations. Digester resolves tags\nfor container and init container images in Kubernetes Pod and Pod template\nspecs.\n\nTerraform\n---------\n\n[Terraform](https://www.terraform.io/intro/index.html) is an\ninfrastructure management platform.\n\nYou can use the Terraform\n[Google Provider](https://www.terraform.io/docs/providers/google/index.html)\nto:\n\n- [Create attestors](https://www.terraform.io/docs/providers/google/r/binary_authorization_attestor.html),\n- [Manage IAM](https://www.terraform.io/docs/providers/google/r/binary_authorization_attestor_iam.html),\n- [Manage Binary Authorization policies](https://www.terraform.io/docs/providers/google/r/binary_authorization_policy.html)."]]