Skip to content

Commit 78f7ce0

Browse files
authored
Merge pull request #45921 from aramase/aramase/d/add_sig_auth_enhancements_v1.30
Add SIG Auth enhancements in v1.30 release blog
2 parents 3fd4c47 + 4c2d41b commit 78f7ce0

File tree

1 file changed

+31
-0
lines changed

1 file changed

+31
-0
lines changed

content/en/blog/_posts/2024-04-17-kubernetes-1.30.md

Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -175,6 +175,37 @@ behaves. It may be specified only when the `.status.loadBalancer.ingress.ip` fie
175175
specified. See more details about [specifying IPMode of load balancer
176176
status](/docs/concepts/services-networking/service/#load-balancer-ip-mode).
177177

178+
### Structured Authentication Configuration ([SIG Auth](https://github.com/kubernetes/community/tree/master/sig-auth))
179+
180+
_Structured Authentication Configuration_ graduates to beta in this release.
181+
182+
Kubernetes has had a long-standing need for a more flexible and extensible
183+
authentication system. The current system, while powerful, has some limitations
184+
that make it difficult to use in certain scenarios. For example, it is not
185+
possible to use multiple authenticators of the same type (e.g., multiple JWT
186+
authenticators) or to change the configuration without restarting the API server. The
187+
Structured Authentication Configuration feature is the first step towards
188+
addressing these limitations and providing a more flexible and extensible way
189+
to configure authentication in Kubernetes. See more details about [structured
190+
authentication configuration](/docs/reference/access-authn-authz/authentication/#using-authentication-configuration).
191+
192+
### Structured Authorization Configuration ([SIG Auth](https://github.com/kubernetes/community/tree/master/sig-auth))
193+
194+
_Structured Authorization Configuration_ graduates to beta in this release.
195+
196+
Kubernetes continues to evolve to meet the intricate requirements of system
197+
administrators and developers alike. A critical aspect of Kubernetes that
198+
ensures the security and integrity of the cluster is the API server
199+
authorization. Until recently, the configuration of the authorization chain in
200+
kube-apiserver was somewhat rigid, limited to a set of command-line flags and
201+
allowing only a single webhook in the authorization chain. This approach, while
202+
functional, restricted the flexibility needed by cluster administrators to
203+
define complex, fine-grained authorization policies. The latest Structured
204+
Authorization Configuration feature aims to revolutionize this aspect by introducing
205+
a more structured and versatile way to configure the authorization chain, focusing
206+
on enabling multiple webhooks and providing explicit control mechanisms. See more
207+
details about [structured authorization configuration](/docs/reference/access-authn-authz/authorization/#configuring-the-api-server-using-an-authorization-config-file).
208+
178209
## New alpha features
179210

180211
### Speed up recursive SELinux label change ([SIG Storage](https://github.com/kubernetes/community/tree/master/sig-storage))

0 commit comments

Comments
 (0)