About this webcast
When creating microservices-based applications, there are concerns regarding the security when it comes to exposing the application to the outside, such as man-in-the-middle attacks and data encryption. In this webcast, you learn how to create different secure routes for your application and utilize Red Hat OpenShift secrets to add certificates for your application, ensuring the validation of the application and encryption of the connection.
This webcast uses a free Kubernetes cluster with an IBM Cloud Pay-As-You-Go account. Register for an IBM Cloud account to get started. Then, follow this guide to upgrade your account to a Pay-As-You-Go account.
Masa Abushamleh is a cloud-native and AI developer advocate. She usually builds demos and writes content focusing on showcasing the capabilities of Red Hat OpenShift. She’s mainly interested in DevOps, serverless, and administration on OpenShift.
Youssef Alnemr is a developer advocate who spends most of his time playing with Red Hat OpenShift, machine learning, and different IBM Watson services. In his free time, Youssef enjoys competitive programming and skating.