Controlling Application Permissions with Security Context Constraints SCC (OpenShift Administration)

preview_player
Показать описание
Title :
Controlling Application Permissions with Security Context Constraints SCC (OpenShift Administration)
...................................

** For detail about OpenShift development --

Controlling Application Permissions with Security Context Constraints

Security Context Constraints (SCCs)
SCCs control:
• Running privileged containers.
• Requesting extra capabilities for a container
• Using host directories as volumes.
• Changing the SELinux context of a container.
• Changing the user ID.

OpenShift provides eight default SCCs:
• anyuid
• hostaccess
• hostmount-anyuid
• hostnetwork
• node-exporter
• nonroot
• privileged
• restricted

Lab:
• Create service accounts and assign security context constraints (SCCs) to them.
• Assign a service account to a deployment configuration.
• Run applications that need root privileges.

commands--
oc new-project authorization-scc

Log in as the admin user

oc get pod/pod-id -o yaml | oc adm policy scc-subject-review -f -

oc create sa gitlab-sa

oc adm policy add-scc-to-user anyuid -z gitlab-sa

Log in as the developer user

oc set serviceaccount deployment/gitlab gitlab-sa

Рекомендации по теме
Комментарии
Автор

can I get ex380 study materials please

SureshKumar-wykn
Автор

-z Means we are passing the Service account to apply the SCC

pradeep
Автор

its not commandeered to be a copy paste pro trainer, please try to make it manually and clarification is more required of the conept

pradeep