Trusted Connector 6.2.0
+ Support for time-based usage control (via policies passed to endpoints via /usage-control
prior to payload transfer). Checkout example-idscp2-uc
for insights. Documentation to follow soon.
* Hash-based Docker image allow-listing improved, overriding CMD
or ENTRYPOINT
is now forbidden in order to make illegitimate container modifications harder.