@@ -155,41 +155,14 @@ is reachable from the public internet.
155
155
### Authorization mode configuration {#choice-of-authz-config}
156
156
157
157
You can configure the Kubernetes API server's authorizer chain using either
158
- [ command line arguments ] ( #using-flags- for-your- authorization-module ) only or, as a beta feature,
159
- using a [ configuration file ] ( #using-configuration-file- for-authorization ) .
158
+ a [ configuration file ] ( #using-configuration-file- for-authorization ) only or
159
+ [ command line arguments ] ( #using-flags- for-your- authorization-module ) .
160
160
161
161
You have to pick one of the two configuration approaches; setting both ` --authorization-config `
162
162
path and configuring an authorization webhook using the ` --authorization-mode ` and
163
163
` --authorization-webhook-* ` command line arguments is not allowed.
164
164
If you try this, the API server reports an error message during startup, then exits immediately.
165
165
166
- ### Command line authorization mode configuration {#using-flags-for-your-authorization-module}
167
-
168
- {{< feature-state state="stable" for_k8s_version="v1.8" >}}
169
-
170
- You can use the following modes:
171
-
172
- * ` --authorization-mode=ABAC ` (Attribute-based access control mode)
173
- * ` --authorization-mode=RBAC ` (Role-based access control mode)
174
- * ` --authorization-mode=Node ` (Node authorizer)
175
- * ` --authorization-mode=Webhook ` (Webhook authorization mode)
176
- * ` --authorization-mode=AlwaysAllow ` (always allows requests; carries [ security risks] ( #warning-always-allow ) )
177
- * ` --authorization-mode=AlwaysDeny ` (always denies requests)
178
-
179
- You can choose more than one authorization mode; for example:
180
- ` --authorization-mode=Node,RBAC,Webhook `
181
-
182
- Kubernetes checks authorization modules based on the order that you specify them
183
- on the API server's command line, so an earlier module has higher priority to allow
184
- or deny a request.
185
-
186
- You cannot combine the ` --authorization-mode ` command line argument with the
187
- ` --authorization-config ` command line argument used for
188
- [ configuring authorization using a local file] ( #using-configuration-file-for-authorization-mode ) .
189
-
190
- For more information on command line arguments to the API server, read the
191
- [ ` kube-apiserver ` reference] ( /docs/reference/command-line-tools-reference/kube-apiserver/ ) .
192
-
193
166
<!-- keep legacy hyperlinks working -->
194
167
<a id =" configuring-the-api-server-using-an-authorization-config-file " />
195
168
@@ -337,6 +310,31 @@ A reload **must not** add or remove Node or RBAC authorizers (they can be reorde
337
310
but cannot be added or removed).
338
311
{{< /note >}}
339
312
313
+ ### Command line authorization mode configuration {#using-flags-for-your-authorization-module}
314
+
315
+ You can use the following modes:
316
+
317
+ * ` --authorization-mode=ABAC ` (Attribute-based access control mode)
318
+ * ` --authorization-mode=RBAC ` (Role-based access control mode)
319
+ * ` --authorization-mode=Node ` (Node authorizer)
320
+ * ` --authorization-mode=Webhook ` (Webhook authorization mode)
321
+ * ` --authorization-mode=AlwaysAllow ` (always allows requests; carries [ security risks] ( #warning-always-allow ) )
322
+ * ` --authorization-mode=AlwaysDeny ` (always denies requests)
323
+
324
+ You can choose more than one authorization mode; for example:
325
+ ` --authorization-mode=Node,RBAC,Webhook `
326
+
327
+ Kubernetes checks authorization modules based on the order that you specify them
328
+ on the API server's command line, so an earlier module has higher priority to allow
329
+ or deny a request.
330
+
331
+ You cannot combine the ` --authorization-mode ` command line argument with the
332
+ ` --authorization-config ` command line argument used for
333
+ [ configuring authorization using a local file] ( #using-configuration-file-for-authorization-mode ) .
334
+
335
+ For more information on command line arguments to the API server, read the
336
+ [ ` kube-apiserver ` reference] ( /docs/reference/command-line-tools-reference/kube-apiserver/ ) .
337
+
340
338
## Privilege escalation via workload creation or edits {#privilege-escalation-via-pod-creation}
341
339
342
340
Users who can create/edit pods in a namespace, either directly or through an object that
0 commit comments