Select Your Destiny Friday

From news on the latest Red Hat product releases to essays on the hottest technologies – all authored by some of Red Hat’s best and brightest – the Red Hat Enterprise Linux Blog has been working to surface the information you need.  As we worked our way towards two years of posting goodness – we’ve covered everything from kpatch to containers.

That said, we have yet to ask you, our loyal readership, what you want to hear next.  So… for a change of pace, we’re asking you to “select your destiny”.  How does one go about “selecting their destiny”?  The answer is simple: by taking part in this straw poll.

We look forward to your selection!

Red Hat Certificate System 9 Now Available

We are pleased to announce the release of Red Hat Certificate System 9.  Supported on Red Hat Enterprise Linux 7.1 and based on the open source PKI capabilities of the Dogtag Certificate System, Red Hat Certificate System 9 provides a robust and flexible set of features to support Certificate Life Cycle Management.  It is able to issue, renew, suspend, revoke, archive/recover, and manage the single and dual-key X.509v3 certificates needed to handle strong authentication, single sign-on, and secure communications.  Red Hat Certificate System 9 incorporates several new and enhanced features, including

Continue reading “Red Hat Certificate System 9 Now Available”

What is Deep Container Inspection (DCI) and Why is it Important?

The format of container images is at the center of industry attention because it is so important to the adoption of containers.  With the advent of the Open Container Initiative (OCI), it seems appropriate to compare container images to network protocols.  Before TCP/IP became the defacto standard network protocol stack, each vendor was left to devise their own.  Some leveraged IPX/SPX, while others standardized on AppleTalk.  This made it difficult to create robust tooling.  Much like network protocols, standardizing the bit level format of a container image, allows the industry to focus on higher level business problems, and more importantly, their respective solutions.

Continue reading “What is Deep Container Inspection (DCI) and Why is it Important?”

Now Available: Red Hat Enterprise Linux 7.2 Beta

In March, we announced the general availability of Red Hat Enterprise Linux 7.1, the first update to our Red Hat Enterprise Linux 7 platform.  In addition, we also announced the general availability of Red Hat Enterprise Linux Atomic Host, our first container-optimized host platform. Today, we are pleased to announce the beta availability of Red Hat Enterprise Linux 7.2.

Red Hat Enterprise Linux 7.2 beta includes a number of new features and enhancements – while continuing to provide the stability, reliability, and security required to meet the demands of both modern datacenters and next-generation IT environments.

Interested in learning more?  For more information on the beta release of Red Hat Enterprise Linux 7.2 you can review the release notes in the Red Hat Customer Portal.

Ready to get started?  If you’re an existing Red Hat customer (with an active Red Hat Enterprise Linux subscription), you can access and download Red Hat Enterprise Linux 7.2 beta via the Software & Download Center.

Exploring Red Hat Access Insights

With the release of Red Hat Enterprise Linux 6.7, we’re happy to also announce general availability of Red Hat Access Insights, a new hosted service from Red Hat designed to help customers proactively identify and resolve issues that could impact business operations.

Given the complexity and scale of modern IT environments, we recognize that it can be increasingly complicated to monitor, maintain, and secure enterprise infrastructure.  By tapping into Red Hat’s collective experience

Continue reading “Exploring Red Hat Access Insights”

Announcing “Yum + RPM for Containerized Applications” — Nulecule & Atomic App

The promise of Docker is that it simplifies application deployment, allows greater application density on hosts, and features a portable format that offers unparalleled flexibility over standard packaging. But one thing Docker doesn’t get you is the simplicity of `yum install foo` to install an application. Nor can Docker define or process a directed graph of container orchestration dependencies. We aim to change that.

Continue reading “Announcing “Yum + RPM for Containerized Applications” — Nulecule & Atomic App”

Red Hat Directory Server 10 Now Generally Available

Today, we are pleased to announced the general availability of Red Hat Directory Server 10, the latest version of Red Hat’s open source, network-based registry server. Built on the technologies delivered by the 389 Directory Server project, Red Hat Directory Server offers a Lightweight Directory Access Protocol (LDAP)-compliant server that centralizes critical application information, simplifies user management and enhances security across an entire organization.

As a tool for building business applications, Red Hat Directory Server provides

Continue reading “Red Hat Directory Server 10 Now Generally Available”

Identity Management and Two-Factor Authentication Using One-Time Passwords

Two-factor authentication, or 2FA, is not something new. It has existed for quite some time and in different forms. What is a ‘factor’? A factor is something you have, something you know, or something you are. For example, if we combine a PIN that you know, with your fingerprint, we get a 2FA based on biometrics. In practice, biometric solutions are not often used because it’s not especially difficult to steal someone’s fingerprint (…and it is quite hard to revoke or replace your finger). The more practical approach to two-factor authentication is to combine something you know, a PIN or password, with something you have.

Something you have often comes in form of

Continue reading “Identity Management and Two-Factor Authentication Using One-Time Passwords”

Identity Management and Certificates

Identity Management (IdM) in Red Hat Enterprise Linux includes an optional Certificate Authority (CA) component. This CA is the same CA included with the Red Hat Certificate System (RHCS). If they’re the same, what is the relationship between IdM and RHCS? Is there a secret plan to replace one with another? This post reviews some of the details associated with each of the offerings and explores different use cases – indicating where you might choose to use one solution over the other.

Continue reading “Identity Management and Certificates”

Identity Management or Red Hat Directory Server – Which One Should I Use?

In the identity management server space Red Hat has two offerings: Identity Management (IdM) in Red Hat Enterprise Linux and Red Hat Directory Server (RHDS). This article is dedicated to helping you understand why there are two solutions and how to chose the best one for your environment.

Before diving in too deep

Continue reading “Identity Management or Red Hat Directory Server – Which One Should I Use?”