In order to secure access to a Docker Enterprise cluster, we use Docker's role-based access control system. We will get into more details on the role-based access control system in the pilot phase, but for our PoC, we need a user with sufficient access to deploy our PoC application containers to the cluster.
Deploying a PoC application to a Docker Enterprise cluster
The Docker Enterprise CLI bundle
Docker Enterprise makes it easy to manage access to your cluster. It gives you fine-grained access controls to resources in the cluster by generating a bundle (.zip file) consisting of your user certificates signed by the UCP certificate authority that was created when you installed UCP and scripts for connecting...