Ensure the network is setup according to the information for securing your cluster.
You can enable authentication in your datacenter with DC/OS oauth. Authentication is managed through the DC/OS web interface. The Admin Router enforces access control.
Out of the box DC/OS has an OpenID Connect 1.0 endpoint at dcos.auth0.com (in cooperation with Auth0) with connections to Google, GitHub, and Microsoft to provide basic authentication for DC/OS installations. DC/OS automatically adds the first user that logs in to the DC/OS cluster.
DC/OS uses the JSON Web Token (JWT) format for its authentication tokens. JWT is an open, industry standard (RFC 7519) method for securely representing claims between two parties. JWTs are obtained using OpenID Connect 1.0, which is a simple identity layer built on top of the OAuth 2.0 protocol.
DC/OS OAuth provides an HTTP API for managing local users in a RESTful fashion.
Authentication HTTP API Endpoint
You can make external calls to HTTP API endpoints in your DC/OS cluster.…Read More
Authentication is managed in the DC/OS web interface.…Read More
Adding Users Manually
You can add users to your DC/OS cluster from a terminal by using the dcos_add_user.py script. This script is included by default with your DC/OS installation.…Read More
Users are granted access to DC/OS by another authorized user. A default user is automatically created by the first user that logs in to the DC/OS cluster.…Read More
Securing communication with TLS
You can set up secure HTTPS communication using a custom server certificate with your DC/OS cluster by setting up a proxy between the Admin Router and user agent requests coming in from outside of the cluster.…Read More