This learning path is designed for anyone interested in getting up to speed on using security context constraints with Red Hat OpenShift. Security context constraints (SCCs) allow containerized applications to access protected Linux functionality.
This learning path consists of introductory and detailed articles and a step-by-step tutorial with hands-on demonstrations that show you how to create and use SCCs with OpenShift deployments.
Video will open in new tab or window.
Outcomes
After completing this learning path, you will:
Have a firm understanding of SCC concepts, including:
What is an SCC?
Deploying a secure pod
How a pod requests additional access
How an SCC specifies permissions
OpenShift's predefined SCCs
Creating a custom SCC
How a deployment specifies permissions
Gain hands-on experience using SCCs, including:
Recognizing what SCC and security context is assigned to a workload
Using a default service account and default security context
Looking for SCC validation errors
Creating an SCC and assigning it to a service account
Using a security context that requests special permissions with an SCC that allows them
About cookies on this siteOur websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising.For more information, please review your cookie preferences options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.