订阅内容

Icon_RH_Hardware_Monitor-Webinar_RGB_Shiny When it comes to adopting containers, security is the highest adoption barrier according to 53 percent of IT operations and development professionals working with containers today. While there is no shortage of container security news, there is still some debate about the best way to properly secure containers.

Join Red Hat's Dan Walsh and Jordan Liggitt for this webinar on January 13th at 11:00 EDT, when you will gain a better understanding of how security and authentication work in Red Hat Atomic Enterprise Platform. You will learn:

  • The difference between privileged and non-privileged containers
  • How security is mapped from the pod to the container to the Kernel
  • How security context is carried through to the persistent storage with extended attributes
  • How to connect Atomic Enterprise Platform to an enterprise authentication system including Active Directory, LDAP service, and public oAuth services like Github
  • How the framework for authentication and authorization between components and for tasks works
  • The differences between Administrative oadm capabilities and User oc capabilities

SPEAKERS

WHEN

Wednesday, January 13, 2016 from 11:00 AM to 12:00 PM (ET)

WHERE

To register to attend the webcast today, visit: http://red.ht/aep-webcast-2s-reg.  


关于作者

按频道浏览

automation icon

自动化

有关技术、团队和环境 IT 自动化的最新信息

AI icon

人工智能

平台更新使客户可以在任何地方运行人工智能工作负载

open hybrid cloud icon

开放混合云

了解我们如何利用混合云构建更灵活的未来

security icon

安全防护

有关我们如何跨环境和技术减少风险的最新信息

edge icon

边缘计算

简化边缘运维的平台更新

Infrastructure icon

基础架构

全球领先企业 Linux 平台的最新动态

application development icon

应用领域

我们针对最严峻的应用挑战的解决方案

Original series icon

原创节目

关于企业技术领域的创客和领导者们有趣的故事