Virtual Container Host Security

VCHs authenticate Docker API client connections by using client certificates. This configuration is commonly referred to as tlsverify in documentation about containers and Docker. When you deploy a VCH, you must specify the level of security that applies to connections from Docker clients to the Docker API endpoint that is running in the VCH. The security options that vic-machine create provides allow for three broad categories of VCH client security:

You must run all vic-machine commands with a vSphere administrator account. However, you can configure a VCH so that it uses an account with reduced privileges for post-deployment operation, instead of using the vSphere administrator account. For information about using a separate account for post-deployment operation, Use Different User Accounts for VCH Deployment and Operation.

results matching ""

    No results matching ""