YoVDO

Securing Backstage Plugins Using the Permissions Framework

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Access Control Courses Backstage Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore best practices for securing Backstage plugins using the permissions framework in this informative conference talk. Gain valuable insights and practical guidance for plugin developers, integrators, and administrators as Gorkem Ercan from Red Hat delves into the importance of fine-grained access control within the Backstage platform. Learn how to identify plugin features that require security measures, determine appropriate permission granularity, and implement effective integration techniques for plugin developers. Discover strategies for implementing authorization logic and permission policies tailored for integrators and administrators. This 21-minute presentation equips you with essential knowledge to enhance the security of your organization's software development lifecycle management using Backstage.

Syllabus

Securing Backstage Plugins Using the Permissions Framework - Gorkem Ercan, Red Hat


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Introduction to Backstage: Developer Portals Made Easy
Linux Foundation via edX
How Brex Leverages Backstage for Fintech Engineering Growth
Linux Foundation via YouTube
Open Source Work Is Work - Strategies for Sustainability and Support
Linux Foundation via YouTube
Improving Developer Experience with Backstage
Linux Foundation via YouTube
Closing the Developer Experience Gap of Container Platforms
CNCF [Cloud Native Computing Foundation] via YouTube