Skip to content

Commit 2167f90

Browse files
committed
rephrase the content
1 parent f89116d commit 2167f90

File tree

1 file changed

+2
-2
lines changed
  • content/en/docs/reference/access-authn-authz

1 file changed

+2
-2
lines changed

content/en/docs/reference/access-authn-authz/rbac.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1125,7 +1125,7 @@ Examples:
11251125

11261126
Default RBAC policies grant scoped permissions to control-plane components, nodes,
11271127
and controllers, but grant *no permissions* to service accounts outside the `kube-system` namespace
1128-
(beyond discovery permissions given to all authenticated users).
1128+
(beyond the permissions given by [API discovery roles](#discovery-roles)).
11291129

11301130
This allows you to grant particular roles to particular ServiceAccounts as needed.
11311131
Fine-grained role bindings provide greater security, but require more effort to administrate.
@@ -1250,7 +1250,7 @@ service accounts.
12501250

12511251
Default RBAC policies grant scoped permissions to control-plane components, nodes,
12521252
and controllers, but grant *no permissions* to service accounts outside the `kube-system` namespace
1253-
(beyond discovery permissions given to all authenticated users).
1253+
(beyond the permissions given by [API discovery roles](#discovery-roles)).
12541254

12551255
While far more secure, this can be disruptive to existing workloads expecting to automatically receive API permissions.
12561256
Here are two approaches for managing this transition:

0 commit comments

Comments
 (0)