Verify that Chainguard FIPS Containers are Configured to Use FIPS Modules
Learn how to verify that Chainguard FIPS Containers are properly configured to use various FIPS modules.
Chainguard Libraries require specific network access to ensure secure delivery of hardened dependencies to your development environment. This guide details the domains and ports needed for authentication, package downloads, and verification tools.
For initial configuration with chainctl as well as for verification of downloaded libraries with cosign and other tools, you must allow HTTPS access to the following domains:
dl.enforce.dev for download and update of chainctlissuer.enforce.dev for authentication with the Chainguard Console and with chainctlconsole-api.enforce.dev for Chainguard Console and chainctl to administrate and use
your Chainguard accounts.console.chainguard.dev for the Chainguard Console to administrate and use your
Chainguard accounts.When using a repository manager, ensure your network allows outbound HTTPS access to the following domains from your repository manager. Your workstations and build infrastructure typically require no additional network access, as libraries are served through your repository manager. If accessing Chainguard Libraries directly for testing with curl or builds, ensure your network allows outbound HTTPS access to these domains from your workstation:
libraries.cgr.dev and 9236a389bd48b984df91adc1bc924620.r2.cloudflarestorage.com for library accessissuer.enforce.dev for authenticationNote that the
9236a389bd48b984df91adc1bc924620.r2.cloudflarestorage.comhost is used to serve files vialibraries.cgr.dev. The same host is also used to serve Chainguard Container images.
Last updated: 2025-07-23 15:09