File tree Expand file tree Collapse file tree 1 file changed +2
-2
lines changed
content/en/docs/reference/access-authn-authz Expand file tree Collapse file tree 1 file changed +2
-2
lines changed Original file line number Diff line number Diff line change @@ -1125,7 +1125,7 @@ Examples:
1125
1125
1126
1126
Default RBAC policies grant scoped permissions to control-plane components, nodes,
1127
1127
and controllers, but grant *no permissions* to service accounts outside the `kube-system` namespace
1128
- (beyond discovery permissions given to all authenticated users ).
1128
+ (beyond the permissions given by [API discovery roles](#discovery-roles) ).
1129
1129
1130
1130
This allows you to grant particular roles to particular ServiceAccounts as needed.
1131
1131
Fine-grained role bindings provide greater security, but require more effort to administrate.
@@ -1250,7 +1250,7 @@ service accounts.
1250
1250
1251
1251
Default RBAC policies grant scoped permissions to control-plane components, nodes,
1252
1252
and controllers, but grant *no permissions* to service accounts outside the `kube-system` namespace
1253
- (beyond discovery permissions given to all authenticated users ).
1253
+ (beyond the permissions given by [API discovery roles](#discovery-roles) ).
1254
1254
1255
1255
While far more secure, this can be disruptive to existing workloads expecting to automatically receive API permissions.
1256
1256
Here are two approaches for managing this transition :
You can’t perform that action at this time.
0 commit comments