- Limit users that can login to a subset of all users
- The clusters are insecure
- Red Hat Integration (RHMI) 2
- Red Hat Openshift Dedicated (OSD) 4
- Open ID Connect (OIDC) authentication protocol
- Only a subset of users should be able to authenticate
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.