Account 登录

Icon_RH_Hardware_Monitor-Webinar_RGB_ShinyWhen it comes to adopting containers, security is the highest adoption barrier according to 53 percent of IT operations and development professionals working with containers today. While there is no shortage of container security news, there is still some debate about the best way to properly secure containers.

Join Red Hat's Dan Walsh and Jordan Liggitt for this webinar on January 13th at 11:00 EDT, when you will gain a better understanding of how security and authentication work in Red Hat Atomic Enterprise Platform. You will learn:

  • The difference between privileged and non-privileged containers
  • How security is mapped from the pod to the container to the Kernel
  • How security context is carried through to the persistent storage with extended attributes
  • How to connect Atomic Enterprise Platform to an enterprise authentication system including Active Directory, LDAP service, and public oAuth services like Github
  • How the framework for authentication and authorization between components and for tasks works
  • The differences between Administrative oadm capabilities and User oc capabilities

SPEAKERS

WHEN

Wednesday, January 13, 2016 from 11:00 AM to 12:00 PM (ET)

WHERE

To register to attend the webcast today, visit: http://red.ht/aep-webcast-2s-reg.  


About the author

Red Hat logo LinkedInYouTubeFacebookTwitter

产品

工具

试用、购买或出售

沟通

关于红帽

我们是世界领先的企业开源解决方案供应商,提供包括 Linux、云、容器和 Kubernetes。我们致力于提供经过安全强化的解决方案,从核心数据中心到网络边缘,让企业能够更轻松地跨平台和环境运营。

订阅我们的新闻稿 Red Hat Shares

立即注册

选择语言

© 2022 Red Hat, Inc. 京ICP备09066747号 Red Hat Summit