Skip to content

Commit 54e1d33

Browse files
author
Tim Bannister
authored
Align with style guide
1 parent 1ed331c commit 54e1d33

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

content/en/docs/concepts/security/rbac-good-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -183,7 +183,7 @@ mutating webhooks, also mutate admitted objects.
183183

184184
### Namespace modification
185185

186-
Users who can perform `patch` operations on `namespace` objects through a namespaced rolebinding can modify
186+
Users who can perform **patch** operations on Namespace objects (through a namespaced RoleBinding to a Role with that access) can modify
187187
labels on that namespace. In clusters where Pod Security Admission is used, this may allow a user to configure the namespace
188188
for a more permissive policy than intended by the administrators.
189189
For clusters where NetworkPolicy is used, users may be set labels that indirectly allow

0 commit comments

Comments
 (0)