Skip to content

Latest commit

 

History

History
49 lines (41 loc) · 1.77 KB

README.adoc

File metadata and controls

49 lines (41 loc) · 1.77 KB
Table of Contents

Podman Series

This is a Series of Podman related articles on how to achieve various things that are not clear and sometimes not trivial.

Summary

It also addresses using Podman in restrictive environments. Examples of such are private security enclaves such as corporations and government. These environments always require at least a proxy to access Internet resources beyond the private security enclave. Many times, but not all, the internally facing proxy requires HTTPS with privately issued certificate authority certificates (sometimes this is to enable SSL / TLS inspection for externally accessed resources. All of these impact the success rate of utilizing Podman in restrictive environments.