Manage images¶ Create a repository Image names in MSR Multi-architecture images Review repository information Pull and push images Pull an image Push an image Windows image limitations Delete images Scan images for vulnerabilities Security scan process Scanning process Binary scan Layers excluded from scanning Scan images Security scan on push Manual scanning Change the scanning mode Review security scan results Scan summaries Detailed report What to do next Override a vulnerability Scanner reporting Export a scanner report Submit a scanner report Prevent tags from being overwritten Make tags immutable Sign images Sign an image Sign images that MKE can trust Import an MKE user’s private key Initialize the trust metadata and add the user’s public certificate Sign the image Add delegations Delete trust data Delete signed images Identify the roles that signed an image Remove trust data for a role Delete the image Where to go next Using Docker Content Trust with a Remote MKE Cluster Prerequisites Registering MSR with a remote Mirantis Kubernetes Engine Signing an image in MSR Enforce Signed Image Tags on the Remote MKE Troubleshooting Example Errors Image or trust data does not exist Image did not meet required signing policy MSR URL must be a registered trusted registry