Securing Backstage Plugins Using the Permissions Framework
CNCF [Cloud Native Computing Foundation] via YouTube
PowerBI Data Analyst - Create visualizations and dashboards from scratch
The Most Addictive Python and SQL Courses
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore best practices for securing Backstage plugins using the permissions framework in this informative conference talk. Gain valuable insights and practical guidance for plugin developers, integrators, and administrators as Gorkem Ercan from Red Hat delves into the importance of fine-grained access control within the Backstage platform. Learn how to identify plugin features that require security measures, determine appropriate permission granularity, and implement effective integration techniques for plugin developers. Discover strategies for implementing authorization logic and permission policies tailored for integrators and administrators. This 21-minute presentation equips you with essential knowledge to enhance the security of your organization's software development lifecycle management using Backstage.
Syllabus
Securing Backstage Plugins Using the Permissions Framework - Gorkem Ercan, Red Hat
Taught by
CNCF [Cloud Native Computing Foundation]