Securing model endpoints
When exposing models as APIs, you will want to limit the access to your APIs to certain clients. You will also want to ensure that the APIs are not vulnerable to known Common Vulnerabilities and Exposures (CVE). When you store your model containers in Red Hat Quay, it will scan the containers to find out any CVE in the libraries and the runtime of your code. Quay is outside the scope of this book but there is plenty of information available on Quay. Packt’s OpenShift Multi-Cluster Management Handbook contains details about Quay, if you want to know more about it.
The API you deployed earlier in this chapter can be accessed via the HTTPS protocol. This means that OpenShift is already encrypting the traffic using the certificates that have been configured to expose the applications. The configuration of these certificates is outside the scope of this book.
The first step is to restrict access to the API through an authentication mechanism. RHODS...