Setup Trusted Profile Analyzer

Quick Logout Links

Prior to starting this module, click the following two links and make sure you log out of previous sessions to prevent errors related to performing actions as the wrong user.

Overview

The Trusted Profile Analyzer (TPA) is a critical component for analyzing and evaluating software profiles in secure environments. This module provides comprehensive guidance for installing and configuring TPA in different environments to meet your organization’s security and compliance requirements.

TPA helps organizations:

  • Analyze software profiles for security vulnerabilities

  • Ensure compliance with security policies

  • Integrate with trusted software supply chain workflows

  • Provide detailed reporting and analytics

guac logo

TPA is the Red Hat distribution of the trustify project under the GUAC Community. GUAC is an acronym for Graph for Understanding Artifact Composition

In essence, TPA is a graph database with a user frontend and rich REST API (that the frontend also uses) aggregating and correlating components and packages from SBOMs with CVEs and Security Advisories, providing you with a 360° view of your software stack.

Installation Options

TPA can be deployed in multiple environments depending on your infrastructure and requirements. Choose the appropriate installation guide for your environment:

Setup TPA on OpenShift

Install and configure TPA on OpenShift Container Platform for containerized environments. This option provides:

  • Scalable deployment using Kubernetes operators

  • Integration with OpenShift security features

  • Container-based analysis workflows

  • Integration with OpenShift monitoring and logging

Setup TPA on RHEL

Install and configure TPA directly on Red Hat Enterprise Linux systems for traditional server deployments. This option provides:

  • Direct installation on RHEL 8/9 systems

  • System-level integration

  • Traditional service management

  • Bare-metal or VM deployment options

Prerequisites

Before proceeding with either installation option, ensure you have:

  • Appropriate system access and administrative privileges

  • Network connectivity for downloading packages and dependencies

  • Understanding of your organization’s security policies

  • Access to required Red Hat subscriptions and repositories

Next Steps

Select the appropriate installation guide based on your target environment:

  1. For container-based deployments: Follow the OpenShift installation guide

  2. For traditional server deployments: Follow the RHEL installation guide

Both installation methods will result in a fully functional TPA deployment that can be integrated into your trusted software supply chain workflows.