Skip to content

Commit 558d7d1

Browse files
authored
Merge pull request #66082 from ShaunaDiaz/OSDOCS-8124
/lgtm
2 parents 2afc322 + 180d28d commit 558d7d1

File tree

4 files changed

+16
-24
lines changed

4 files changed

+16
-24
lines changed

microshift_running_apps/microshift-authentication.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
:_content-type: ASSEMBLY
22
[id="authentication-with-microshift"]
3-
= Pod security authentication and authorization on {product-title}
3+
= Pod security authentication and authorization
44
include::_attributes/attributes-microshift.adoc[]
55
:context: authentication-microshift
66

7-
== Understanding and managing pod security admission
7+
== Understanding and managing pod security admission
88

99
Pod security admission is an implementation of the link:https://kubernetes.io/docs/concepts/security/pod-security-standards/[Kubernetes pod security standards]. Use pod security admission to restrict the behavior of pods.
1010

modules/microshift-security-context-constraints-opting.adoc

Lines changed: 6 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,13 @@
22
//
33
// * microshift_running_apps/microshift-authentication.adoc
44

5-
:_content-type: PROCEDURE
5+
:_content-type: PROCEDURE
66
[id="microshift-security-context-constraints-opting_{context}"]
77
= Controlling pod security admission synchronization
88

9-
You can enable or disable automatic pod security admission synchronization for most namespaces.
9+
You can enable automatic pod security admission synchronization for most namespaces.
10+
11+
System defaults are not enforced when the `security.openshift.io/scc.podSecurityLabelSync` field is empty or set to `false`. You must set the label to `true` for synchronization to occur.
1012

1113
[IMPORTANT]
1214
====
@@ -18,23 +20,14 @@ Namespaces that are defined as part of the cluster payload have pod security adm
1820
* `kube-public`
1921
* `openshift`
2022
* All system-created namespaces that are prefixed with `openshift-`, except for `openshift-operators`
21-
By default, all namespaces that have an `openshift-` prefix are not synchronized. You can enable synchronization for any user-created [x-]`openshift-*` namespaces. You cannot enable synchronization for any system-created [x-]`openshift-*` namespaces, except for `openshift-operators`.
23+
By default, all namespaces that have an `openshift-` prefix are not synchronized. You can enable synchronization for any user-created [x-]`openshift-*` namespaces. You cannot enable synchronization for any system-created [x-]`openshift-*` namespaces, except for `openshift-operators`.
2224
2325
If an Operator is installed in a user-created `openshift-*` namespace, synchronization is turned on by default after a cluster service version (CSV) is created in the namespace. The synchronized label inherits the permissions of the service accounts in the namespace.
2426
====
2527

2628
.Procedure
2729

28-
* For each namespace that you want to configure, set a value for the `security.openshift.io/scc.podSecurityLabelSync` label:
29-
** To disable pod security admission label synchronization in a namespace, set the value of the `security.openshift.io/scc.podSecurityLabelSync` label to `false`.
30-
+
31-
Run the following command:
32-
+
33-
[source,terminal]
34-
----
35-
$ oc label namespace <namespace> security.openshift.io/scc.podSecurityLabelSync=false
36-
----
37-
** To enable pod security admission label synchronization in a namespace, set the value of the `security.openshift.io/scc.podSecurityLabelSync` label to `true`.
30+
* To enable pod security admission label synchronization in a namespace, set the value of the `security.openshift.io/scc.podSecurityLabelSync` label to `true`.
3831
+
3932
Run the following command:
4033
+

modules/microshift-security-context-constraints.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,13 @@
77

88
= Security context constraint synchronization with pod security standards
99

10-
{product-title} includes link:https://kubernetes.io/docs/concepts/security/pod-security-admission[Kubernetes pod security admission]. Globally, the `restricted` profile is enforced by default for {product-title}.
10+
{microshift-short} includes link:https://kubernetes.io/docs/concepts/security/pod-security-admission[Kubernetes pod security admission].
1111

1212
In addition to the global pod security admission control configuration, a controller exists that applies pod security admission control `warn` and `audit` labels to namespaces according to the security context constraint (SCC) permissions of the service accounts that are in a given namespace.
1313

1414
[IMPORTANT]
1515
====
16-
Namespaces that are defined as part of the cluster payload have pod security admission synchronization disabled permanently. You can enable pod security admission synchronization on other namespaces as necessary. If an Operator is installed in a user-created `openshift-*` namespace, synchronization is turned on by default after a cluster service version (CSV) is created in the namespace.
16+
Namespaces that are defined as part of the cluster payload have pod security admission synchronization disabled permanently. You can enable pod security admission synchronization on other namespaces as necessary. If an Operator is installed in a user-created `openshift-*` namespace, synchronization is turned on by default after a cluster service version (CSV) is created in the namespace.
1717
====
1818

1919
The controller examines `ServiceAccount` object permissions to use security context constraints in each namespace. Security context constraints (SCCs) are mapped to pod security profiles based on their field values; the controller uses these translated profiles. Pod security admission `warn` and `audit` labels are set to the most privileged pod security profile found in the namespace to prevent warnings and audit logging as pods are created.

modules/microshift-viewing-security-context.adoc

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,22 +2,21 @@
22
//
33
// * microshift_running_apps/microshift-authentication.adoc
44

5-
:_content-type: PROCEDURE
5+
:_content-type: PROCEDURE
66
[id="microshift-viewing-security-context_{context}"]
7-
= Viewing security context constraints in a namespace
7+
= Viewing security context constraints in a namespace
88

9-
MicroShift allows you to access the security context constraints (SCC) permissions in a given namespace.
9+
You can view the security context constraints (SCC) permissions in a given namespace.
1010

11-
.Prerequisites
11+
.Prerequisites
1212

13-
* You have installed the OpenShift CLI (`oc`)
13+
* You have installed the OpenShift CLI (`oc`).
1414
1515
.Procedure
1616

17-
* To view the security context constraints in your namespace, run the following command:
17+
* To view the security context constraints in your namespace, run the following command:
1818
+
1919
[source,terminal]
2020
----
2121
oc get --show-labels namespace <namespace>
2222
----
23-

0 commit comments

Comments
 (0)