From the course: Securing Containers and Kubernetes Ecosystem

Unlock the full course today

Join today to access over 23,100 courses taught by industry experts.

Access management

Access management

- [Instructor] Before a client such as kubectl or another Kubernetes component can perform any operation in Kubernetes, it must meet three criteria. The client must prove it is who it claims to be, the client must be permitted to perform the action it is requesting, and third, the requested operation, especially if it modifies a Kubernetes object, must be compliant with the security policy. The API server takes the help of three access control plugins to verify these criteria. Authentication plugins, authorization plugins, and admission control plugins. Now let's start to look at the authentication plugins.

Contents