Skip to content

Commit d8dbc91

Browse files
authored
Merge pull request #48487 from ritazh/kep_3221_ga
KEP-3221: remove mentions of beta and featuregate, and change order of cmd line
2 parents dcf8cd9 + 7d8b07e commit d8dbc91

File tree

1 file changed

+27
-29
lines changed

1 file changed

+27
-29
lines changed

content/en/docs/reference/access-authn-authz/authorization.md

Lines changed: 27 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -165,41 +165,14 @@ to the built-in `cluster-admin` ClusterRole.
165165
### Authorization mode configuration {#choice-of-authz-config}
166166

167167
You can configure the Kubernetes API server's authorizer chain using either
168-
[command line arguments](#using-flags-for-your-authorization-module) only or, as a beta feature,
169-
using a [configuration file](#using-configuration-file-for-authorization).
168+
a [configuration file](#using-configuration-file-for-authorization) only or
169+
[command line arguments](#using-flags-for-your-authorization-module).
170170

171171
You have to pick one of the two configuration approaches; setting both `--authorization-config`
172172
path and configuring an authorization webhook using the `--authorization-mode` and
173173
`--authorization-webhook-*` command line arguments is not allowed.
174174
If you try this, the API server reports an error message during startup, then exits immediately.
175175

176-
### Command line authorization mode configuration {#using-flags-for-your-authorization-module}
177-
178-
{{< feature-state state="stable" for_k8s_version="v1.8" >}}
179-
180-
You can use the following modes:
181-
182-
* `--authorization-mode=ABAC` (Attribute-based access control mode)
183-
* `--authorization-mode=RBAC` (Role-based access control mode)
184-
* `--authorization-mode=Node` (Node authorizer)
185-
* `--authorization-mode=Webhook` (Webhook authorization mode)
186-
* `--authorization-mode=AlwaysAllow` (always allows requests; carries [security risks](#warning-always-allow))
187-
* `--authorization-mode=AlwaysDeny` (always denies requests)
188-
189-
You can choose more than one authorization mode; for example:
190-
`--authorization-mode=Node,RBAC,Webhook`
191-
192-
Kubernetes checks authorization modules based on the order that you specify them
193-
on the API server's command line, so an earlier module has higher priority to allow
194-
or deny a request.
195-
196-
You cannot combine the `--authorization-mode` command line argument with the
197-
`--authorization-config` command line argument used for
198-
[configuring authorization using a local file](#using-configuration-file-for-authorization-mode).
199-
200-
For more information on command line arguments to the API server, read the
201-
[`kube-apiserver` reference](/docs/reference/command-line-tools-reference/kube-apiserver/).
202-
203176
<!-- keep legacy hyperlinks working -->
204177
<a id="configuring-the-api-server-using-an-authorization-config-file" />
205178

@@ -347,6 +320,31 @@ A reload **must not** add or remove Node or RBAC authorizers (they can be reorde
347320
but cannot be added or removed).
348321
{{< /note >}}
349322

323+
### Command line authorization mode configuration {#using-flags-for-your-authorization-module}
324+
325+
You can use the following modes:
326+
327+
* `--authorization-mode=ABAC` (Attribute-based access control mode)
328+
* `--authorization-mode=RBAC` (Role-based access control mode)
329+
* `--authorization-mode=Node` (Node authorizer)
330+
* `--authorization-mode=Webhook` (Webhook authorization mode)
331+
* `--authorization-mode=AlwaysAllow` (always allows requests; carries [security risks](#warning-always-allow))
332+
* `--authorization-mode=AlwaysDeny` (always denies requests)
333+
334+
You can choose more than one authorization mode; for example:
335+
`--authorization-mode=Node,RBAC,Webhook`
336+
337+
Kubernetes checks authorization modules based on the order that you specify them
338+
on the API server's command line, so an earlier module has higher priority to allow
339+
or deny a request.
340+
341+
You cannot combine the `--authorization-mode` command line argument with the
342+
`--authorization-config` command line argument used for
343+
[configuring authorization using a local file](#using-configuration-file-for-authorization-mode).
344+
345+
For more information on command line arguments to the API server, read the
346+
[`kube-apiserver` reference](/docs/reference/command-line-tools-reference/kube-apiserver/).
347+
350348
## Privilege escalation via workload creation or edits {#privilege-escalation-via-pod-creation}
351349

352350
Users who can create/edit pods in a namespace, either directly or through an object that

0 commit comments

Comments
 (0)