Release 0.71.0 - Introducing Ockam Orchestrator #3381
mrinalwadhwa
announced in
Announcements
Replies: 2 comments 14 replies
-
Hi @mrinalwadhwa, Thank you in advance, while enrolling with Ockam Orchestrator with command |
Beta Was this translation helpful? Give feedback.
7 replies
-
Hi @mrinalwadhwa, I am trying this example from two different systems which are in two different private networks. I am getting the following Error in one syatem. Can you please help me out.
|
Beta Was this translation helpful? Give feedback.
7 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Release 0.71.0 - Introducing Ockam Orchestrator
This release introduces Ockam Orchestrator! A cloud service that helps you orchestrate end-to-end encryption, mutual authentication, key management, credential management & authorization policy enforcement — at scale.
Please try running it and do share it with your friends
https://github.com/build-trust/ockam/releases/tag/ockam_v0.71.0
As a first example. Let's create an end-to-end encrypted, mutually authenticated, secure and private cloud relay:
We just created end-to-end encrypted, mutually authenticated, and authorized secure communication between a tcp client and server. This client and server can be running in separate private networks / NATs. We didn't have to expose our server by opening a port on the Internet or punching a hole in our firewall.
The two sides authenticated and authorized each other's known, cryptographically provable identifiers. In later examples we'll see how we can build granular, attribute-based access control with authorization policies.
To learn more, install and run
ockam --help
Community Contributors
The following people, from our community, contributed to this release 🥁 🚀
The Ockam Team is extremely thankful for your amazing contributions 🙏
Please try the above examples, we would love your thoughts and feedback.
Beta Was this translation helpful? Give feedback.
All reactions