Security for Developers
Improve your application's security and close vulnerabilities with improved tooling and processes.
Improve your application's security and close vulnerabilities with improved tooling and processes.
Defend against vulnerabilities with RHEL 9's system-wide, automatically updating encryption policy.
Explore how to modify a non-standard library cryptography operation to call into OpenSSL conditionally based on system FIPS requirements.
This guide helps you understand OpenShift audit logs and classify them based on the resource involved and the action performed.
Aside from naming and versioning, managing sensitive assets, like credentials, is one of the more challenging aspects in technology. So, why is it so difficult? Well, to start off. What may be considered a sensitive asset to one individual or organization may not be the same as another. Also, given that there are so many different ways that sensitive assets can be managed, there is no universally accepted method available.
The challenges that encompass how sensitive assets are handled also apply to image mode, a new method that enables building and deploying Operating Systems using similar tools and approaches as any other traditional container. In this article, we will discuss the types of sensitive assets that apply to image mode for RHEL specifically and how to design appropriate workflows to incorporate secure practices within all phases, from build and deployment to runtime.
Learn how workstation users authenticating to Active Directory using the Kerberos protocol can use SPNEGO tokens with Red Hat build of Keycloak.
Learn how to set up Red Hat build of Keycloak as an Identity Broker on OpenShift using Active Directory Federation Services as a SAML 2.0 Identity Provider.