read-onlyaccess for the internal
Auditteam to log in to the registry and look at any repository and tag and have the ability to inspect security vulnerabilities.
- Require read-only access for a different
complianceteam to scan the images that are developed within one's company to validate
3rd party licenses.
- As of now, one has to share
superuseraccess to the auditors instead of a user with limited access.
- Red Hat Quay
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.