Skip to content

Commit 7d8b07e

Browse files
committed
KEP-3221: remove mentions of beta and change order of cmd line
Signed-off-by: Rita Zhang <[email protected]>
1 parent 9779ecf commit 7d8b07e

File tree

1 file changed

+27
-29
lines changed

1 file changed

+27
-29
lines changed

content/en/docs/reference/access-authn-authz/authorization.md

Lines changed: 27 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -155,41 +155,14 @@ is reachable from the public internet.
155155
### Authorization mode configuration {#choice-of-authz-config}
156156

157157
You can configure the Kubernetes API server's authorizer chain using either
158-
[command line arguments](#using-flags-for-your-authorization-module) only or, as a beta feature,
159-
using a [configuration file](#using-configuration-file-for-authorization).
158+
a [configuration file](#using-configuration-file-for-authorization) only or
159+
[command line arguments](#using-flags-for-your-authorization-module).
160160

161161
You have to pick one of the two configuration approaches; setting both `--authorization-config`
162162
path and configuring an authorization webhook using the `--authorization-mode` and
163163
`--authorization-webhook-*` command line arguments is not allowed.
164164
If you try this, the API server reports an error message during startup, then exits immediately.
165165

166-
### Command line authorization mode configuration {#using-flags-for-your-authorization-module}
167-
168-
{{< feature-state state="stable" for_k8s_version="v1.8" >}}
169-
170-
You can use the following modes:
171-
172-
* `--authorization-mode=ABAC` (Attribute-based access control mode)
173-
* `--authorization-mode=RBAC` (Role-based access control mode)
174-
* `--authorization-mode=Node` (Node authorizer)
175-
* `--authorization-mode=Webhook` (Webhook authorization mode)
176-
* `--authorization-mode=AlwaysAllow` (always allows requests; carries [security risks](#warning-always-allow))
177-
* `--authorization-mode=AlwaysDeny` (always denies requests)
178-
179-
You can choose more than one authorization mode; for example:
180-
`--authorization-mode=Node,RBAC,Webhook`
181-
182-
Kubernetes checks authorization modules based on the order that you specify them
183-
on the API server's command line, so an earlier module has higher priority to allow
184-
or deny a request.
185-
186-
You cannot combine the `--authorization-mode` command line argument with the
187-
`--authorization-config` command line argument used for
188-
[configuring authorization using a local file](#using-configuration-file-for-authorization-mode).
189-
190-
For more information on command line arguments to the API server, read the
191-
[`kube-apiserver` reference](/docs/reference/command-line-tools-reference/kube-apiserver/).
192-
193166
<!-- keep legacy hyperlinks working -->
194167
<a id="configuring-the-api-server-using-an-authorization-config-file" />
195168

@@ -337,6 +310,31 @@ A reload **must not** add or remove Node or RBAC authorizers (they can be reorde
337310
but cannot be added or removed).
338311
{{< /note >}}
339312

313+
### Command line authorization mode configuration {#using-flags-for-your-authorization-module}
314+
315+
You can use the following modes:
316+
317+
* `--authorization-mode=ABAC` (Attribute-based access control mode)
318+
* `--authorization-mode=RBAC` (Role-based access control mode)
319+
* `--authorization-mode=Node` (Node authorizer)
320+
* `--authorization-mode=Webhook` (Webhook authorization mode)
321+
* `--authorization-mode=AlwaysAllow` (always allows requests; carries [security risks](#warning-always-allow))
322+
* `--authorization-mode=AlwaysDeny` (always denies requests)
323+
324+
You can choose more than one authorization mode; for example:
325+
`--authorization-mode=Node,RBAC,Webhook`
326+
327+
Kubernetes checks authorization modules based on the order that you specify them
328+
on the API server's command line, so an earlier module has higher priority to allow
329+
or deny a request.
330+
331+
You cannot combine the `--authorization-mode` command line argument with the
332+
`--authorization-config` command line argument used for
333+
[configuring authorization using a local file](#using-configuration-file-for-authorization-mode).
334+
335+
For more information on command line arguments to the API server, read the
336+
[`kube-apiserver` reference](/docs/reference/command-line-tools-reference/kube-apiserver/).
337+
340338
## Privilege escalation via workload creation or edits {#privilege-escalation-via-pod-creation}
341339

342340
Users who can create/edit pods in a namespace, either directly or through an object that

0 commit comments

Comments
 (0)