Security

container-security
Article

Security Considerations for Container Runtimes

Daniel Walsh

Video: Security Considerations for Container Runtimes. Explains/demonstrates using Kubernetes with different security features for your container environment.

.NET Core
Article

Securing .NET Core on OpenShift using HTTPS

Tom Deseyn

This post describes how to secure ASP.NET Core applications on OpenShift using HTTPS for two use-cases: terminating SSL in OpenShift for public routes and terminating SSL in ASP.NET Core directly using OpenShift-generated service certificates.

Red Hat AMQ image
Article

How to set up LDAP authentication for the Red Hat AMQ 7 message broker console

Elvadas Nono

This post shows how to set up LDAP authentication on Red Hat AMQ 7. As part of the procees, it describes how to configure AMQ to authenticate users from LDAP and allow only users from a specified group to access the AMQ management console and publish messages in queues.

Video Thumbnail
Video

A deep dive into Keycloak | DevNation Tech Talk

Stian Thorgersen

This session will give you a great introduction to Keycloak, an open source identity and access management solution for modern applications and services.

Firewalld logo
Article

Firewalld: The Future is nftables

Eric Garver

Firewalld, the default firewall management tool in Red Hat Enterprise Linux and Fedora, has gained long sought support for nftables. This was announced in detail on firewalld's project blog. The feature landed in the firewalld 0.6.0 release as the new default firewall backend. The benefits of nftables have been outlined on the Red Hat Developer Blog: What comes after iptables? Its successor, of course: nftables Benchmarking nftables Migrating my iptables setup to nftables There are many longstanding issues with firewalld...

GNU C library
Article

Detecting String Truncation with GCC 8

Martin Sebor

To detect common programming errors, GCC 8 contains a number of new warnings and enhancements to existing checkers to help find non-obvious bugs in C and C++ code. This article focuses on those that deal with inadvertent string truncation and discusses some of the approaches to avoiding the underlying problems.

Article

Elytron: A New Security Framework in WildFly/JBoss EAP

Siddhartha De

Elytron is a new security framework that ships with WildFly version 10 and Red Hat JBoss Enterprise Application Platform (EAP) 7.1. Elytron is a replacement of PicketBox and JAAS. It is a single security framework that can be used for both securing applications and management access to Wildfly/JBoss.

Topic

Secure coding

Tutorials and training on how to build secure applications using the latest in

Red Hat OpenShift Container Platform
Article

Integrating Intercede RapID with Red Hat Mobile and OpenShift

Evan Shortiss

In this article, we’ll demonstrate how Red Hat Mobile v4 and OpenShift v3 enable customers to rapidly deploy and secure their mobile applications by integrating with a third party product provided by Intercede. We’ll be using Intercede’s RapID product to enable two-way TLS.

Open Virtual Network
Article

Non-root Open vSwitch in RHEL

Aaron Conole

In a few weeks, the Fast Datapath Production channel will update the Open vSwitch version from the 2.7 series to the 2.9 series. This is an important change, a wealth of new features and fixes all related to packet movement will come into play.

3Scale by Red Hat
Article

3Scale by Red Hat Integration with ForgeRock using OpenID Connect

Vinay Bhalerao

This article shows Redhat 3Scale integration with ForgeRock using OpenID Connect. We will show how to integrate ForgeRock with 3scale by Red Hat. ForgeRock is one of the popular and growing identity management companies.

3Scale by Red Hat
Article

3scale by Red Hat API and Identity Management Series

Vinay Bhalerao

API management, such as Red Hat's 3scale evolved to meet the challenges that arise from making APIs available to client applications. Learn how how an existing Identity and Access Management (IAM) solution, can be integrated with an Identity Providers (IdP) to provide secure access to API endpoints using 3scale.

Red Hat Developers program
Article

Annobin - Storing Extra Information in Binaries

Nick Clifton

Compiled files, often called binaries, are a mainstay of modern computer systems. It is often hard for system builders and users to find out more than just very basic information about these files. The Annobin project exists as means to understand how the binary was built and what testing was performed on the binary.

Integrate  RH-SSO 7.x
Article

Integrate RH-SSO 7.x with Liferay DXP using SAML

Ricardo Zanini

How to integrate RH-SSO 7.x with Liferay DXP using SAML protocol. The aim of this tutorial is to configure Red Hat Single Sign On (RH-SSO) to work as an Identity Provider (IdP) for Liferay DXP through SAML.

RedHat Shadowman Logo
Article

Enabling SAML-based SSO with Remote EJB through Picketlink

Siddhartha De

you have a remote Enterprise JavaBeans (EJB) application where the EJB client is a service pack (SP) application in a Security Assertion Markup Language (SAML) architecture. You would like your remote EJB to be authenticated using same assertion which was used for SP.

How to customize OpenShift RBAC permissions
Article

Dynamically Creating Java Keystores in OpenShift

Raffaele Spazzoli +1

Introduction With a simple annotation to a service, you can dynamically create certificates in OpenShift. Certificates created this way are in PEM (base64-encoded certificates) format and cannot be directly consumed by Java applications, which need certificates to be stored in Java KeyStores . In this post, we are going to show a simple approach to enable Java applications to benefit from certificates dynamically created by OpenShift. Why certificates Certificates are part of a PKI infrastructure and can be used to...