Enable applications to access protected Linux functionality using OpenShift security context constraints

This session teaches why some applications need access to protected Linux functionality, how developers can configure that in the deployment manifest, and how cluster administrators can control that using security context constraints (SCCs) in OpenShift. Learn the purpose of SCCs, how deployments and SCCs specify permissions, and how SCCs work as part of RBAC security.