In this chapter, you learned about various identity providers that implement authentication in OpenShift, service accounts, and gained an understanding of the connection between users and identities. We also discussed the process of authorization and granting privileges to users, admission controllers, and security context constraints. Lastly, we talked about secrets and learned how they can be used by applications.
In the next chapter, we will deal with networking on the upper level—OpenShift SDN.