- Limit users that can login to a subset of all users
- The clusters are insecure
- Red Hat Integration (RHMI) 2
- Red Hat Openshift Dedicated (OSD) 4
- Open ID Connect (OIDC) authentication protocol
- Only a subset of users should be able to authenticate
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.