Skip to content

Commit 0d57c5d

Browse files
committed
Fix note about SA OIDC discovery doc default binding
Added in v1.19: https://pr.k8s.io/88344 Signed-off-by: Monis Khan <[email protected]>
1 parent 027eb24 commit 0d57c5d

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

content/en/docs/tasks/configure-pod-container/configure-service-account.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -349,8 +349,11 @@ JSON Web Key Set (JWKS) at `/openid/v1/jwks`. The OpenID Provider Configuration
349349
is sometimes referred to as the _discovery document_.
350350

351351
Clusters include a default RBAC ClusterRole called
352-
`system:service-account-issuer-discovery`. No role bindings are provided
353-
by default. Administrators may, for example, choose whether to bind the role to
352+
`system:service-account-issuer-discovery`. A default RBAC ClusterRoleBinding
353+
assigns this role to the `system:serviceaccounts` group, which all service
354+
accounts implicitly belong to. This allows pods running on the cluster to access
355+
the service account discovery document via their mounted service account token.
356+
Administrators may, additionally, choose to bind the role to
354357
`system:authenticated` or `system:unauthenticated` depending on their security
355358
requirements and which external systems they intend to federate with.
356359

0 commit comments

Comments
 (0)