OpenShift Commons Briefing: CyberArk Conjur Secrets Management on OpenShift
April 4, 2018 | by
OpenShift Commons Briefing Summary
In this briefing, Naama Schwartzblat and Kumbirai Tanekha (CyberArk) discuss and demo how to securely inject secrets into your applications and manage machine identities with CyberArk Conjur. Kumbirai Tanekha and Naama Schwartzblat,the lead developers on Conjur both of whom worked directly on the Conjur-OpenShift integration. They demonstrated how secrets can be managed and delivered securely to applications running in OpenShift without developer impedance, and how OpenShift security policy for secrets and machine identity can be managed as code.
Learn More at the Next OpenShift Commons Gathering in San Francisco on May 7th at Red Hat Summit!
Red Hatters, CNCF/Kubernetes project leads, community members with production deployments, and numerous other members of the OpenShift Commons will be gathering together in London for the upcoming OpenShift Commons Gathering at the QE II Centre.
Don't forget to leave your feedback and suggestions for each video on YouTube or in the comments section below. This will be incredibly important to shape this Special Interest Group and create sessions that fit the demands of all the OpenShift developers in the community.
About OpenShift Commons
OpenShift Commons is the place for organizations that are part of the OpenShift community to connect with peers and other related open source technology communities to communicate and collaborate across all OpenShift projects and stakeholders.
The Commons' goal is to foster collaboration and communication between OpenShift stakeholders to drive success for all members, and expand & facilitate points of connection between members for sharing knowledge and experience to help drive success for the platform and for participants: customers, users, partners, and contributors.
Overview Red Hat Advanced Cluster Security (RHACS) Central is installed with one administrator user by default. Typically, customers request an integration with existing Identity Provider(s) (IDP). ...
This is a guest post written by Milan Patel, Product Manager, IBM Security Verify. IBM Security Verify SaaS is a purpose-built Identity-as-a-Service (IDaaS) to help clients optimize how they protect ...