官术网_书友最值得收藏!

Security

The final step is to provide certificate information to secure the cluster. You can secure communication between the clients and the cluster and the communication between the nodes of the cluster using X509 certificates. The communication security can be implemented by adding X509 certificates to a key vault store and configuring the cluster to apply the certificates in this step. To keep this walk-through simple, we will not secure our cluster this time:

Service Fabric cluster configuration: Security Blade

It is highly recommended that you always use a secured cluster for your production workloads. You have to plan for security at initial stages of development as an unsecure cluster cannot be secured later and a new cluster would need to be created if you decide to secure your cluster later. You can read more about securing your cluster in Chapter 9, Securing and Managing Your Microservices.

主站蜘蛛池模板: 通化市| 儋州市| 屏边| 建宁县| 五大连池市| 六安市| 太仓市| 石泉县| 禹州市| 中西区| 岐山县| 商洛市| 沾化县| 习水县| 虹口区| 临安市| 资中县| 湾仔区| 古交市| 曲阳县| 庐江县| 荥阳市| 天峻县| 清苑县| 鄂托克前旗| 汝州市| 贞丰县| 景宁| 疏勒县| 文水县| 鄂尔多斯市| 综艺| 临西县| 曲靖市| 贵港市| 武陟县| 屏东市| 自治县| 怀化市| 东阳市| 陆丰市|