From the course: Securing Containers and Kubernetes Ecosystem
Unlock the full course today
Join today to access over 23,100 courses taught by industry experts.
Access management - Kubernetes Tutorial
From the course: Securing Containers and Kubernetes Ecosystem
Access management
- [Instructor] Before a client such as kubectl or another Kubernetes component can perform any operation in Kubernetes, it must meet three criteria. The client must prove it is who it claims to be, the client must be permitted to perform the action it is requesting, and third, the requested operation, especially if it modifies a Kubernetes object, must be compliant with the security policy. The API server takes the help of three access control plugins to verify these criteria. Authentication plugins, authorization plugins, and admission control plugins. Now let's start to look at the authentication plugins.
Contents
-
-
-
-
-
-
-
-
(Locked)
Securing applications in Kubernetes2m 47s
-
(Locked)
Pod Security Standard3m 34s
-
(Locked)
Access management53s
-
(Locked)
Authenticating users4m 54s
-
(Locked)
Authenticating service accounts2m 11s
-
(Locked)
Authorization3m 51s
-
(Locked)
Admission control3m 20s
-
(Locked)
Security context2m 59s
-
(Locked)
Security Policy57s
-
(Locked)
Kubernetes network security3m 16s
-
(Locked)
Secrets management5m 15s
-
(Locked)
-
-
-