Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Securing Backstage Plugins Using the Permissions Framework

CNCF [Cloud Native Computing Foundation] via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore best practices for securing Backstage plugins using the permissions framework in this informative conference talk. Gain valuable insights and practical guidance for plugin developers, integrators, and administrators as Gorkem Ercan from Red Hat delves into the importance of fine-grained access control within the Backstage platform. Learn how to identify plugin features that require security measures, determine appropriate permission granularity, and implement effective integration techniques for plugin developers. Discover strategies for implementing authorization logic and permission policies tailored for integrators and administrators. This 21-minute presentation equips you with essential knowledge to enhance the security of your organization's software development lifecycle management using Backstage.

Syllabus

Securing Backstage Plugins Using the Permissions Framework - Gorkem Ercan, Red Hat

Taught by

CNCF [Cloud Native Computing Foundation]

Reviews

Start your review of Securing Backstage Plugins Using the Permissions Framework

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.