You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Generally, the RBAC system prevents users from creating clusterroles with more rights than the user possesses.
139
+
The exception to this is the `escalate` verb. As noted in the [RBAC documentation](/docs/reference/access-authn-authz/rbac/#restrictions-on-role-creation-or-update),
141
140
users with this right can effectively escalate their privileges.
142
141
143
142
### Bind verb
144
143
145
-
Similar to the `escalate` verb, granting users this right allows for bypass of Kubernetes
144
+
Similar to the `escalate` verb, granting users this right allows for the bypass of Kubernetes
146
145
in-built protections against privilege escalation, allowing users to create bindings to
0 commit comments