You are here
Red Hat Training
Sponsored by Red Hat
Tuesday, November 10, 9:00 am–5:00 pm
FREE: Open to all LISA attendees
- Part 1 (9:00 am–noon). Identity Management for Modern Infrastructure.
- Part 2 (1:30 pm–5:00 pm). Managing Container Security.
- Namespaces and Docker
- Docker and SELinux
- Super Privileged Containers
Part 1. Identity Management for Modern Infrastructure
Abstract: Identity Management is a complex area. Do it wrong, and it turns out to be a source of constant problems, outages, and a resource drain. Do it right, and you get a a highly scalable flexible environment needed to provide identity management services for existing systems in the datacenter as well as for the new technologies like cloud- and container-based applications demanded by the line of business.
The workshop will give a deep overview of the identity management technologies available in Fedora, CentOS, and Red Hat Enterprise Linux, how they are related, and how they can be used to solve real problems within the enterprise.
Who Should Attend: System administrators and IT professionals that need to provide identity management services across different platforms (Linux/Unix/Windows) and stacks of software (PaaS/IaaS) as well as developers that want their applications to run in such environments.
Bring Back to Work: Deep understanding of the Identity Management problem space and how existing tools and technologies can solve the problems, reducing costs and complexity. After this workshop you will be able to create a design of your identity management services that connects systems, services, users, infrastructure and applications within your datacenter.
Speaker Bio: Dmitri Pal is a Director of Engineering at Red Hat responsible for the identity management projects and products in the Red Hat portfolio, including Red Hat Directory Server, certificate system, Samba, Kerberos, SSSD (System Security Services Daemon), and the IdM server built using FreeIPA (Identity, Policy, Audit) technology. Dmitri has more than 18 years of security-related software engineering and product management experience. He serves as a Red Hat representative at the MIT Kerberos Consortium board of directors.
Part 2. Managing Container Security
Abstract: If you're thinking about, or are already, using containers in your environment, security should be a top concern. In this tutorial, we'll cover the current state of Docker and Linux container security, talk about namespaces and how they relate to container privileges, and generally cover best practices today for working with containers. We'll also talk about Super Privileged Containers, and how you can use containers to provide system services on minimal hosts. And we'll cover the state of SELinux and containers, and where we hope to be in the near future.
Who Should Attend: System administrators, security professionals, and developers.
Take Back to Work: The knowledge and tools to deploy applications securely with containers.
Speaker Bio: Daniel Walsh has worked in the computer security field for over 30 years. Dan joined Red Hat in August 2001. Dan leads the RHEL Docker enablement team since August 2013, but has been working on container technology for several years. He has led the SELinux project, concentrating on the application space and policy development. Dan helped developed sVirt, Secure Virtualization. He also created the SELinux Sandbox, the Xguest user and the Secure Kiosk. Previously, Dan worked Netect/Bindview's on Vulnerability Assessment Products and at Digital Equipment Corporation working on the Athena Project, AltaVista Firewall/Tunnel (VPN) Products. Dan has a BA in Mathematics from the College of the Holy Cross and a MS in Computer Science from Worcester Polytechnic Institute.