You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* kubelet 调用已配置的 API 服务器上的 `TokenReview` API,以根据持有者令牌确定用户信息
79
79
80
-
<!--
81
-
## Kubelet authorization
80
+
<!--
81
+
## Kubelet authorization
82
82
-->
83
-
## Kubelet 鉴权
83
+
## Kubelet 鉴权 {#kubelet-authorization}
84
84
85
-
<!--
85
+
<!--
86
86
Any request that is successfully authenticated (including an anonymous request) is then authorized. The default authorization mode is `AlwaysAllow`, which allows all requests.
87
87
-->
88
-
任何成功通过身份验证的请求(包括匿名请求)之后都会被鉴权。
88
+
任何成功通过身份验证的请求(包括匿名请求)之后都会被鉴权。
89
89
默认的鉴权模式为 `AlwaysAllow`,它允许所有请求。
90
90
91
-
<!--
91
+
<!--
92
92
There are many possible reasons to subdivide access to the kubelet API:
93
93
-->
94
94
细分对 kubelet API 的访问权限可能有多种原因:
95
95
96
-
<!--
96
+
<!--
97
97
* anonymous auth is enabled, but anonymous users' ability to call the kubelet API should be limited
98
98
* bearer token auth is enabled, but arbitrary API users' (like service accounts) ability to call the kubelet API should be limited
99
99
* client certificate auth is enabled, but only some of the client certificates signed by the configured CA should be allowed to use the kubelet API
@@ -102,12 +102,12 @@ There are many possible reasons to subdivide access to the kubelet API:
102
102
* 启用了持有者令牌认证,但应限制任意 API 用户(如服务帐户)调用 kubelet API 的能力
103
103
* 启用了客户端证书身份验证,但仅应允许已配置的 CA 签名的某些客户端证书使用 kubelet API
104
104
105
-
<!--
105
+
<!--
106
106
To subdivide access to the kubelet API, delegate authorization to the API server:
107
107
-->
108
108
要细分对 kubelet API 的访问权限,请将鉴权委派给 API 服务器:
109
109
110
-
<!--
110
+
<!--
111
111
* ensure the `authorization.k8s.io/v1beta1` API group is enabled in the API server
112
112
* start the kubelet with the `--authorization-mode=Webhook` and the `--kubeconfig` flags
113
113
* the kubelet calls the `SubjectAccessReview` API on the configured API server to determine whether each request is authorized
@@ -117,19 +117,19 @@ To subdivide access to the kubelet API, delegate authorization to the API server
117
117
* kubelet 调用已配置的 API 服务器上的 `SubjectAccessReview` API,
118
118
以确定每个请求是否得到鉴权
119
119
120
-
<!--
120
+
<!--
121
121
The kubelet authorizes API requests using the same [request attributes](/docs/reference/access-authn-authz/authorization/#review-your-request-attributes) approach as the apiserver.
0 commit comments