Its purpose is to point out some typical problems that are important to consider, some of which are inspired by real-world security incidents. The workshop is not meant as an exhaustive training session covering every possible aspect of the technology.
The main principles, however, will be applicable also for other container technologies. We will focus mainly on Docker and its typical use-cases. The goal of this training session is to discuss selected aspects related to containers and present potential security threats. However powerful and attractive the new technology is, we should not ignore security implications that are inherently linked to the principles or main implementations.
The flexibility of containers enabled several new approaches in IT, like DevOps. Scientists, representatives of scientific communitiesĬontainers are an emerging technology that is getting more and more popular as an alternative to full virtualization. The session is of introductory level aiming to serve new communities who want to engage with, and use the EGI Check-in service. We will also feature a few research communities who will report on their experiences in using Check-in to enable their research workflows in distributed environments. We will present various options on how Check-in can support research communities. Check-in is connected to all the EGI services, and also used as an authentication-authorisation system in the European Open Science Cloud.ĭuring this session we will introduce Check-in and its technical components. Check-in allows users to login to services using their preferred IdPs (either institutional or social) in a uniform and easy way. This session provides an overview of the Check-in security service of EGI that enables users to login and be authorised on different services across EGI, and even beyond the EGI federation.Ĭheck-in is operated by GRNET for the EGI community and its partners as a central hub to connect federated Identity Providers (IdPs) with service providers (SPs). Please find all information regarding the programme, speakers, posters, registration and other on this conference page.įor further questions, do not hesitate to contact: are open during the course of the conference. Don't forget to register if you're interested in joining! Please find all information on the dedicated subpage and tick the box in the registration form should you be interested in attending.Īlso on the 5th (and 6th): FitSM training. Īdditionally, we have a co-located event on Thursday 5 November organised by the EOSC Synergy project, presenting and discussing the Dutch data landscape during a half day workshop. Make sure to consult the timetable, these sessions are all colored in light blue. With our theme “Federated infrastructures for connected communities” we aim to bring together science, computing, and (international) collaboration through a diverse and interactive programme.Īre you new to our annual conferences and interested in how EGI can help your team or community in using advanced computing systems? Then the 'New communities' track of the conference is a must-attend for you! The track starts with an introduction to EGI, then goes into details on the four technical areas of EGI: Computing, Data management, Authentication-authorisation, and Data analytics. More on Zoom rooms are on the dedicated page (see left bar). Please consult the timetable for the full programme and make sure to look at the Zoom room the session will be held. Recorded sessions can be found on our YouTube playlist: go.egi.eu/egi2020videos Please share your feedback with us: go.egi.eu/egi2020feedback The 2020 edition of the EGI conference has ended, we thank you all for your participation.