-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Learn OpenShift
By :
Controlling who can access your OpenShift cluster and how they authenticate is crucial for security. In this section, we'll cover the basics of OAuth, identity management, and user accounts in OpenShift. By understanding these, you'll be able to manage access effectively, ensuring that only the right users can interact with the necessary resources.
As mentioned above, the OpenShift Platform has its own built‑in OAuth server, one of the default and main system components deployed on the cluster. The OAuth server implements the OAuth 2.0 authorization framework (RFC 6749), an open standard for delegated authorization. The component is responsible for issuing access tokens, allowing the user to authenticate themselves against an API server.When a user initiates a request for a new OAuth token, the OAuth server communicates with the configured identity provider to determine the requester's identity. Then, the OAuth...
Change the font size
Change margin width
Change background colour