From the course: Kubernetes Network and Cluster Hardening by Pearson

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

Kubernetes cccess control

Kubernetes cccess control

Controlling access to the Kubernetes API is something that we've talked about at least at a high level in other lessons. But in this particular lesson, it's important that you understand that there are key components within Kubernetes that allow for you to be able to provide some very sophisticated access control to the API, as well as all the various components of Kubernetes that an individual may or may not need access to. Everything starts with that user and that service account. Once you make a connection into the API server, that's gonna require you to authenticate. That authentication typically is gonna be a certificate, it might be a token, all these different aspects that you can use to be able to authenticate to the system that will tie a user to a particular resource and a profile. Once that user has been authenticated, the authorization part is where we take that level of access to that particular user or service account gets, and then we put rules and safeguards on it. So…

Contents