문의하기

When it comes to adopting containers, security is the highest adoption barrier according to 53 percent of IT operations and development professionals working with containers today. While there is no shortage of container security news, there is still some debate about the best way to properly secure containers.

Join Red Hat's Dan Walsh and Jordan Liggitt for this webinar on January 13th at 11:00 EDT, when you will gain a better understanding of how security and authentication work in Red Hat Atomic Enterprise Platform. You will learn:

  • The difference between privileged and non-privileged containers
  • How security is mapped from the pod to the container to the Kernel
  • How security context is carried through to the persistent storage with extended attributes
  • How to connect Atomic Enterprise Platform to an enterprise authentication system including Active Directory, LDAP service, and public oAuth services like Github
  • How the framework for authentication and authorization between components and for tasks works
  • The differences between Administrative oadm capabilities and User oc capabilities

SPEAKERS

WHEN

Wednesday, January 13, 2016 from 11:00 AM to 12:00 PM (ET)

WHERE

To register to attend the webcast today, visit: http://red.ht/aep-webcast-2s-reg.  


Red Hat logoLinkedInYouTubeFacebookTwitter

제품

체험, 구매 & 영업

커뮤니케이션

Red Hat 소개

Red Hat은 Linux, 클라우드, 컨테이너, 쿠버네티스 등을 포함한 글로벌 엔터프라이즈 오픈소스 솔루션 공급업체입니다. Red Hat은 코어 데이터센터에서 네트워크 엣지에 이르기까지 다양한 플랫폼과 환경에서 기업의 업무 편의성을 높여 주는 강화된 기능의 솔루션을 제공합니다.

Red Hat Shares 뉴스레터를 구독하세요

지금 신청하기

언어 선택