-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Learn OpenShift
By :
In any secure system, knowing who is accessing your environment and what they are allowed to do is crucial. In OpenShift, this is managed through authentication and authorization processes. Authentication ensures that only legitimate users can access the cluster, while authorization determines what actions those users can perform once authenticated. Together, these mechanisms protect your OpenShift environment from unauthorized access and potential security threats. Let's talk about Authentication and Authorization and ensure we are on the same page.
Authentication controls initial access to The Red Hat OpenShift Container Platform cluster by verifying the identity of the client that sends a request to the API server. Only clients that can prove their identity are allowed to proceed to the authorization phase.OCP's built-in OAuth server issues bearer access tokens, and the API server also accepts X.509 client certificates (commonly...
Change the font size
Change margin width
Change background colour