提交 8ed2b630 编写于 作者: J John Ferlan

docs: Add news article to describe iSCSI usage of secret object

上级 44516750
...@@ -183,6 +183,16 @@ ...@@ -183,6 +183,16 @@
order of appearance. order of appearance.
</description> </description>
</change> </change>
<change>
<summary>
Securely pass iSCSI authentication data
</summary>
<description>
Rather than supplying the authentication data as part of the
iSCSI URL for a disk or host device, utilize the encrypted
secret object to securely pass the authentication data.
</description>
</change>
</section> </section>
</release> </release>
<release version="v3.9.0" date="2017-11-02"> <release version="v3.9.0" date="2017-11-02">
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册