Container Registry
In order to use Enterprise containers, you'll need access to the Keyfactor registry. If you don't have an account yet, please contact your Sales/Support representative to create one.
Generate an Identity Token
You will need to create an Identity Token to pull container images directly from Keyfactor registry.
Follow these steps to create a token:
Log into Keyfactor registry.
Select the User Menu option Set Me Up.
Select the oci package type.
Select oci from the repository list.
Click Generate Token & Create Instructions.
Save the token and click Done.
This token can now be used to access the Keyfactor registry using tools like Docker and Podman. It can also be utilized to create Kubernetes Secrets to pull an image from a private container image registry, refer to the Kubernetes documentation on Pull Images from a Private Registry.
Create Kubernetes Secret
The following example demonstrates how to set up an image pull secret in Kubernetes.
kubectl create secret docker-registry keyfactor-registry \
--docker-server=registry.primekey.com \
--docker-username=<your-username> \
--docker-password=<repository-token> \
--docker-email=<your-email> \
--namespace <application-namespace>
Once created, the Secret can be referenced in a Helm chart's values file:
imagePullSecrets:
- name: keyfactor-registry
Alternately, you can supply the secret reference using a --set
command line option:
helm install <name> --set imagePullSecrets[0].name=keyfactor-registry \
oci://repo.keyfactor.com/charts/<chart-name>