2021 Call for Code Awards: Live from New York, with SNL’s Colin Jost! Learn more

Get started with security context constraints on Red Hat OpenShift

This learning path is designed for anyone interested in getting up to speed on using security context contraints with Red Hat OpenShift. Security context constraints (SCCs) allow containerized applications to access protected Linux functionality.

This learning path consists of introductory and detailed articles and a step-by-step tutorial with hands-on demonstrations that show you how to create and use SCCs with OpenShift deployments.

Outcomes

After completing this learning path, you will:

  • Have a firm understanding of SCC concepts, including:
    • What is an SCC?
    • Deploying a secure pod
    • How a pod requests additional access
    • How an SCC specifies permissions
    • OpenShift’s predefined SCCs
    • Creating a custom SCC
    • How a deployment specifies permissions
  • Gain hands-on experience using SCCs, including:
    • Recognizing what SCC and security context is assigned to a workload
    • Using a default service account and default security context
    • Looking for SCC validation errors
    • Creating an SCC and assigning it to a service account
    • Using a security context that requests special permissions with an SCC that allows them