Securing Routes for your Microservices on Red Hat OpenShift

Cover Photo

Feb

16

1:00pm

Securing Routes for your Microservices on Red Hat OpenShift

By IBM Developer

As a Developer, it is important to secure your applications to avoid network attacks like spoofing or attacks that disrupt route discovery, to secure your data and your users' data, and ensure the quality of your service. In this workshop, you will learn more about network security on Red Hat OpenShift.
On Red Hat OpenShift, a route is a way to expose a service by giving it an externally-reachable hostname. Routers provide external hostname mapping and load balancing to services over protocols that pass distinguishing information directly to the router and they support different protocols like HTTP & HTTPS. In this workshop, you will learn different ways of exposing applications for external access, including secure and insecure routes, you will learn the difference between different types of routes and how to secure your routes on Red Hat OpenShift.
🎓 What you will learn
  • Secure vs insecure routes
  • Different types of Secured Routes on Red Hat OpenShift
  • Exposing applications for external access
  • How to secure edge and passthrough routes
👩‍💻 Who should attend
  • Developers, Architects
  • Anyone who's interested in Red Hat OpenShift Security or Kubernetes Security
🎙️ Speakers
  • Masa Abushamleh, Developer Advocate, https://www.linkedin.com/in/masa-abushamleh
  • Youssef Alnemr, Developer Advocate, https://www.linkedin.com/in/youssef-alnemr-01a022156/
☑️ Prerequisites
  • Sign up for your IBM Cloud account – https://ibm.biz/BdfEBn
  • Background knowledge in containers and Kubernetes
------------------------
By registering for this event, you acknowledge that this video will be recorded and you consent for it to be featured on IBM media platforms and pages.

hosted by

IBM Developer

IBM Developer

share

Open in Android app

for a better experience