Categories
00 - Cloud-Native App Dev 00 - Hybrid Cloud Infrastructure Security

You’ve written a Kubernetes-native Application? Here is how OpenShift helps you to run, develop, build and deliver it – securely! (1/4)

This blog kicks off a series of 4 blog articles. They will all be available here, as soon as they get published. Run: Get your Angular, Python or Java Dockerfile ready with Red Hat’s Universal Base Image and deploy with Helm on OpenShift Develop: The Inner Loop with OpenShift Dev Spaces Build: From upstream Tekton […]

Categories
00 - IT Automation & Management 00 - Next-Gen Architecture, Culture & Processes agile ansible ansible tower automation Business Continuance case management configuration management DevOps Disaster Recovery playbooks Security

State of the art end to end automation in three chapters

How to achieve a sound & compelling governance handling change requests, incidents and problem tickets in a DevSecOps scenario – based on authors’ field experience with end to end automation.

Categories
Security

Securing “Layer 8”

Being a life-long techie, I’ve been working with the Open Systems Interconnection (OSI) model for over 30 years in various organisations and it is a tried and tested model on which all modern networks are based. I’ve also worked to secure each layer to ensure that communication and data transfer mechanisms conform to the well […]

Categories
HA-PROXY Red Hat Mobile Security sso Uncategorized

Protecting your Red Hat Mobile Apps with Red Hat SSO

This post demonstrates how you can protect your mobile apps and adding Open ID Connect based single sign on by integrating Red Hat Mobile with Red Hat SSO. The adapters provided by the Keycloak upstream project can be used for handing over user authentication to Red Hat SSO instead of building your own OIDC clients. […]

%d bloggers like this: