mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-27 13:37:30 +00:00
Merge pull request #11755 from mikedanese/auth-service-account
add documentation on how to use service aaccounts with ABAC mode authorization
This commit is contained in:
commit
a1bb6d974d
@ -115,6 +115,28 @@ To permit an action Policy with an unset namespace applies regardless of namespa
|
|||||||
|
|
||||||
[Complete file example](http://releases.k8s.io/HEAD/pkg/auth/authorizer/abac/example_policy_file.jsonl)
|
[Complete file example](http://releases.k8s.io/HEAD/pkg/auth/authorizer/abac/example_policy_file.jsonl)
|
||||||
|
|
||||||
|
### A quick note on service accounts
|
||||||
|
|
||||||
|
A service account automatically generates a user. The user's name is generated according to the naming convention:
|
||||||
|
|
||||||
|
```
|
||||||
|
system:serviceaccount:<namespace>:<serviceaccountname>
|
||||||
|
```
|
||||||
|
|
||||||
|
Creating a new namespace also causes a new service account to be created, of this form:*
|
||||||
|
|
||||||
|
```
|
||||||
|
system:serviceaccount:<namespace>:default
|
||||||
|
```
|
||||||
|
|
||||||
|
For example, if you wanted to grant the default service account in the kube-system full privilege to the API, you would add this line to your policy file:
|
||||||
|
|
||||||
|
```json
|
||||||
|
{"user":"system:serviceaccount:kube-system:default"}
|
||||||
|
```
|
||||||
|
|
||||||
|
The apiserver will need to be restarted to pickup the new policy lines.
|
||||||
|
|
||||||
## Plugin Development
|
## Plugin Development
|
||||||
|
|
||||||
Other implementations can be developed fairly easily.
|
Other implementations can be developed fairly easily.
|
||||||
|
Loading…
Reference in New Issue
Block a user