Procedural

How to Manage Chainguard IAM Organizations
Using Identity and Access Management in Chainguard
Create an Assumable Identity for an AWS role
Procedural tutorial outlining how to create a Chainguard identity that can be assumed by an AWS role.
Getting Started with OpenVEX and vexctl
Using vexctl to manage vulnerability communications
Create an Assumable Identity for a Buildkite Pipeline
Procedural tutorial outlining how to create a Chainguard identity that can be assumed by a Buildkite workflow.
How To Integrate Ping Identity SSO with Chainguard
Procedural tutorial on how to create a Ping Identity Application
Mirror new Images to Google Artifact Registry with Chainguard CloudEvents
Instructional guide outlining how one can set up an application that will listen for push events on a private Chainguard Registry and mirror any new Chainguard Images to a GCP Artifact Registry.
Create an Assumable Identity for a Bitbucket Pipeline
Procedural tutorial outlining how to create a Chainguard identity that can be assumed by a Bitbucket workflow.