Security
The above-mentioned configuration options host the Docker daemon on an unsecured connection, any client with IP and credentials can connect to the host, but this is not a recommended option in production environments. The recommended approach for connecting to remote Docker hosts is using a secured connection using certificate-based authentication. Docker provides the following options for securing the connection using TLS. Transport layer security (TLS) can be used to secure remote connections to the container host. Docker provides an important flag called tlsverify. When this is set to true the daemon searches for a certificate in a default location. The default location of the certificates can also be managed by using option ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access