1
0
mirror of https://github.com/openshift/openshift-docs.git synced 2026-02-05 21:46:22 +01:00

security updates

This commit is contained in:
Neal Timpe
2021-01-12 13:22:17 -05:00
committed by openshift-cherrypick-robot
parent c8eebfd100
commit 88abeab9f2

View File

@@ -7,6 +7,17 @@ toc::[]
If your service mesh application is constructed with a complex array of microservices, you can use {ProductName} to customize the security of the communication between those services. The infrastructure of {product-title} along with the traffic management features of {ProductShortName} can help you manage the complexity of your applications and provide service and identity security for microservices.
.Before you begin
If you have a project, add your project to the xref:../../service_mesh/v2x/installing-ossm.adoc#ossm-member-roll-modify_installing-ossm[`ServiceMeshMemberRoll` resource].
[NOTE]
====
After you add the the namespace to the `ServiceMeshMemberRoll`, access to services or pods in that namespace will not be accessible to callers outside the mesh.
====
If you don't have a project, install the xref:../../service_mesh/v2x/prepare-to-deploy-applications-ossm.adoc#ossm-tutorial-bookinfo-overview_deploying-applications-ossm[Bookinfo sample application] and add it to the `ServiceMeshMemberRoll` resource. The sample application helps illustrate security concepts.
include::modules/ossm-security-mtls.adoc[leveloffset=+1]
include::modules/ossm-security-cipher.adoc[leveloffset=+1]