Further to issue #8, we may also want to restrict where users can access the Hub. For example, only at the universities/institutions we are partnered with on this project. We can achieve this by restricting inbound network traffic to a set of pre-approved IP addresses in the Network Security Rules for the Kubernetes cluster.
TODO
[ ] Restrict inbound network traffic to the Turing IP address
[ ] Collect the IP addresses of our partnered institutions
Summary
Further to issue #8, we may also want to restrict where users can access the Hub. For example, only at the universities/institutions we are partnered with on this project. We can achieve this by restricting inbound network traffic to a set of pre-approved IP addresses in the Network Security Rules for the Kubernetes cluster.
TODO