security

Enhance security with automation_Share
E-book

Enhance security with automation

Red Hat

Explore proven strategies for protecting against security threats using automation in this short e-book.

Featured image for: Value range propagation in GCC with Project Ranger.
Article

GCC's new fortification level: The gains and costs

Siddhesh Poyarekar

Discover the gains and costs of GCC’s enhanced runtime buffer overflow protection. Level 3 _FORTIFY_SOURCE preprocessor macro may detect more buffer overflows, but there’s a cost.

MicroProfile JWT Cover
Cheat Sheet

MicroProfile JWT

Martin Stefanko

JSON Web Tokens (JWT) are a web standard–RFC 7519–but using them with Eclipse MicroProfile may be a mystery. This cheat sheet by Red Hat Senior Software Engineer Martin Stefanko will help you get moving immediately.

Red Hat OpenShift
Article

Five layers of security for Red Hat Data Grid on OpenShift

Kapil Shukla

This article talks about multiple layers of security available while deploying Red Hat Data Grid on OpenShift. The layers of security offer a combination of security measures provided by Data Grid as well as by OpenShift/Kubernetes.

Red Hat Middleware
Article

Red Hat Single Sign-On: Give it a try for no cost!

Nicolas Massé

This article describes how to download and install Red Hat Single Sign-On for no cost. Red Hat Single Sign-On is an easy-to-use access management tool that takes care of the details of most authentication protocols, user consent with UMA, and even access control.

Fedora logo
Article

Annocheck: Examining the contents of binary files

Nick Clifton

Annocheck a new utility to examine how a binary was built and to check that it has all of the appropriate security hardening features enabled. It also has several other modes that perform different kinds of examination of binary files.

container-security
Article

Security Considerations for Container Runtimes

Daniel Walsh

Video: Security Considerations for Container Runtimes. Explains/demonstrates using Kubernetes with different security features for your container environment.

.NET Core
Article

Securing .NET Core on OpenShift using HTTPS

Tom Deseyn

This post describes how to secure ASP.NET Core applications on OpenShift using HTTPS for two use-cases: terminating SSL in OpenShift for public routes and terminating SSL in ASP.NET Core directly using OpenShift-generated service certificates.

Red Hat AMQ image
Article

How to set up LDAP authentication for the Red Hat AMQ 7 message broker console

Elvadas Nono

This post shows how to set up LDAP authentication on Red Hat AMQ 7. As part of the procees, it describes how to configure AMQ to authenticate users from LDAP and allow only users from a specified group to access the AMQ management console and publish messages in queues.

RHEL
Article

How to enable sudo on Red Hat Enterprise Linux

Rob Terzi

For developers, sudo access can be very useful for automating steps in build scripts. Learn how to configure sudo access and enable sudo during system installation.

Firewalld logo
Article

Firewalld: The Future is nftables

Eric Garver

Firewalld, the default firewall management tool in Red Hat Enterprise Linux and Fedora, has gained long sought support for nftables. This was announced in detail on firewalld's project blog . The feature landed in the firewalld 0.6.0 release as the new default firewall backend. The benefits of nftables have been outlined on the Red Hat Developer Blog: What comes after iptables? Its successor, of course: nftables Benchmarking nftables Migrating my iptables setup to nftables There are many longstanding issues with...

Red Hat AMQ image
Article

Setting up RBAC on Red Hat AMQ Broker

Yohanes Widi Sono

This post provides an example of how to configure role-based access control on top of Red Hat AMQ--a flexible, high-performance messaging platform that provides a role-based security model with built-in support for separation of duties.

Kubernetes new application server
Article

Why Kubernetes is The New Application Server

Rafael Benevides

Kubernetes and related technologies, such as Red Hat OpenShift and Istio, provide the non-functional requirements that used to be part of an application server and the additional capabilities described in this article. Does that mean application servers are dead?

.Net Core
Article

Using .NET Core in a "Disconnected" Environment

Rick Wagner

For added security, .NET Core applications that require access to external libraries can be run in a disconnected environment (one without internet access). Here's how.