OpenShift Security Concepts: Difference between revisions
Jump to navigation
Jump to search
Line 12: | Line 12: | ||
=Authorization= | =Authorization= | ||
=Security Context Constraints= | |||
{{External|https://docs.openshift.com/container-platform/latest/architecture/additional_concepts/authorization.html#security-context-constraints}} | |||
OpenShift uses Security Context Constraints (SCCs) to control the actions that a pod can perform and what it has the ability to access. |
Revision as of 19:45, 5 July 2017
External
Internal
Authentication
Authentication Methods
Identity Providers
Authorization
Security Context Constraints
OpenShift uses Security Context Constraints (SCCs) to control the actions that a pod can perform and what it has the ability to access.