Self-Serviced End-to-end Encryption Approaches for Applications Deployed in OpenShift

Introduction The majority of applications deployed on Red Hat OpenShift have some endpoints exposed to the outside of the cluster via a reverse proxy, normally the router (which is implemented with HAProxy). When using a router, the following options are possible: In the diagram we can see: Clear text: the connection is always unencrypted. Edge: […]
The post Self-Serviced End-to-end Encryption Approaches for Applications Deployed in OpenShift appeared first on Red Hat OpenShift Blog.
Quelle: OpenShift

Published by