You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/security-context-constraints-about.adoc
+7-3Lines changed: 7 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,6 +34,7 @@ The cluster contains several default security context constraints (SCCs) as desc
34
34
[IMPORTANT]
35
35
====
36
36
Do not modify the default SCCs. Customizing the default SCCs can lead to issues when some of the platform pods deploy or {product-title} is upgraded. During upgrades between some versions of {product-title}, the values of the default SCCs are reset to the default values, which discards all customizations to those SCCs.
| Provides all features of the `restricted` SCC, but allows users to run with any UID and any GID.
49
50
51
+
ifndef::openshift-dedicated[]
50
52
|`hostaccess`
51
53
|Allows access to all host namespaces but still requires pods to be run with a UID and SELinux context that are allocated to the namespace.
52
54
@@ -78,10 +80,12 @@ If additional workloads are run on control plane hosts, use caution when providi
78
80
====
79
81
This SCC allows host file system access as any UID, including UID 0. Grant with caution.
80
82
====
83
+
endif::[]
81
84
82
85
|`nonroot`
83
86
|Provides all features of the `restricted` SCC, but allows users to run with any non-root UID. The user must specify the UID or it must be specified in the manifest of the container runtime.
84
87
88
+
ifndef::openshift-dedicated[]
85
89
|`privileged`
86
90
|Allows access to all privileged and host features and the ability to run as any user, any group, any FSGroup, and with any SELinux context.
87
91
@@ -107,6 +111,7 @@ The `privileged` SCC allows:
107
111
====
108
112
Setting `privileged: true` in the pod specification does not select the `privileged` SCC. Setting `privileged: true` in the pod specification matches on the `allowPrivilegedContainer` field of an SCC.
109
113
====
114
+
endif::[]
110
115
111
116
|`restricted`
112
117
|Denies access to all host features and requires pods to be run with a UID, and SELinux context that are allocated to the namespace. This is the most restrictive SCC and it is used by default for authenticated users.
@@ -119,7 +124,6 @@ The `restricted` SCC:
119
124
* Requires that a pod is run with a pre-allocated MCS label
120
125
* Allows pods to use any FSGroup
121
126
* Allows pods to use any supplemental group
122
-
123
127
|===
124
128
125
129
[id="scc-settings_{context}"]
@@ -130,7 +134,6 @@ a pod has access to. These settings fall into three categories:
130
134
131
135
[cols="1,3",options="header"]
132
136
|===
133
-
134
137
|Category
135
138
|Description
136
139
@@ -203,7 +206,7 @@ pre-allocated values. Uses the minimum value of the first range as the default.
203
206
Validates against the first ID in the first range.
204
207
* `RunAsAny` - No default provided. Allows any `fsGroup` ID to be specified.
0 commit comments