官术网_书友最值得收藏!

Security

The final step is to provide certificate information to secure the cluster. You can secure communication between the clients and the cluster and the communication between the nodes of the cluster using X509 certificates. The communication security can be implemented by adding X509 certificates to a key vault store and configuring the cluster to apply the certificates in this step. To keep this walk-through simple, we will not secure our cluster this time:

Service Fabric cluster configuration: Security Blade

It is highly recommended that you always use a secured cluster for your production workloads. You have to plan for security at initial stages of development as an unsecure cluster cannot be secured later and a new cluster would need to be created if you decide to secure your cluster later. You can read more about securing your cluster in Chapter 9, Securing and Managing Your Microservices.

主站蜘蛛池模板: 南木林县| 石嘴山市| 昆山市| 玉林市| 安化县| 七台河市| 达州市| 舒兰市| 巩留县| 柘荣县| 教育| 新邵县| 徐州市| 晋中市| 保定市| 揭西县| 扎赉特旗| 弋阳县| 汝城县| 新晃| 大石桥市| 通城县| 新源县| 沽源县| 永年县| 手游| 象山县| 宜良县| 泰顺县| 嘉祥县| 电白县| 东平县| 阜宁县| 名山县| 临朐县| 讷河市| 通州区| 贵州省| 丹巴县| 浏阳市| 东至县|