Jenkins Integration with TigerTrust
TigerTrust's Jenkins plugin brings certificate lifecycle management directly into your CI/CD pipelines. Automate certificate operations, implement enterprise code signing, and ensure certificate compliance throughout your build and deployment processes.
Plugin Installation
Install the TigerTrust plugin from Jenkins Update Center:
// Or install via Jenkinsfile plugins { id 'tigertrust-jenkins' version '1.0.0' }
Declarative Pipeline Integration
Use TigerTrust in declarative pipelines:
pipeline { agent any environment { TIGERTRUST_API_KEY = credentials('tigertrust-api-key') } stages { stage('Build') { steps { sh 'mvn clean package' } } stage('Sign Artifacts') { steps { tigertrustSign( certificateName: 'code-signing-cert', artifacts: 'target/*.jar', timestampServer: 'https://timestamp.digicert.com' ) } } stage('Provision Certificate') { steps { tigertrustProvision( certificateName: 'deployment-cert', commonName: "app-${env.BUILD_NUMBER}.example.com", validityDays: 90, outputPath: 'certs/' ) } } stage('Deploy') { steps { sh './deploy.sh' } } } }
Code Signing
Sign build artifacts with enterprise code signing certificates:
stage('Sign Application') { steps { tigertrustSign( certificateName: 'enterprise-code-signing', artifacts: [ 'build/app.exe', 'build/installer.msi' ], signatureType: 'authenticode', timestampServer: 'https://timestamp.digicert.com', appendSignature: true ) } }
Certificate Validation
Validate certificate compliance before deployment:
stage('Validate Certificates') { steps { script { def result = tigertrustValidate( certificates: 'deploy/certs/*.pem', policy: 'production-policy', failOnViolation: true ) if (result.violations > 0) { error "Certificate policy violations detected" } } } }
Credential Binding
Securely access certificates in pipelines:
pipeline { agent any stages { stage('Deploy with TLS') { steps { withCredentials([ tigertrustCertificate( credentialsId: 'app-tls-cert', certVariable: 'TLS_CERT', keyVariable: 'TLS_KEY' ) ]) { sh ''' kubectl create secret tls app-tls \ --cert=$TLS_CERT \ --key=$TLS_KEY ''' } } } } }
Build Triggers
Trigger builds on certificate events:
pipeline { triggers { tigertrustCertificateExpiring( certificates: ['production-cert', 'staging-cert'], daysBeforeExpiry: 30 ) } stages { stage('Renew Certificate') { steps { tigertrustRenew( certificateName: env.EXPIRING_CERTIFICATE ) } } } }
Shared Libraries
Create reusable certificate functions:
// vars/signArtifacts.groovy def call(Map config) { tigertrustSign( certificateName: config.cert ?: 'default-signing-cert', artifacts: config.artifacts, timestampServer: 'https://timestamp.digicert.com' ) }
Blue Ocean Visualization
TigerTrust plugin provides Blue Ocean integration:
- Visual certificate status indicators
- Signing step visualization
- Certificate expiration warnings
- Compliance report links
Integrate enterprise code signing and certificate lifecycle automation into your Jenkins pipelines with TigerTrust.