You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/security-context-constraints-about.adoc
+10-6Lines changed: 10 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -132,7 +132,7 @@ Setting `privileged: true` in the pod specification does not necessarily select
132
132
endif::[]
133
133
134
134
|`restricted`
135
-
|Denies access to all host features and requires pods to be run with a UID, and SELinux context that are allocated to the namespace. This is the most restrictive SCC provided by a new installation and will be used by default for authenticated users.
135
+
|Denies access to all host features and requires pods to be run with a UID, and SELinux context that are allocated to the namespace.
136
136
137
137
The `restricted` SCC:
138
138
@@ -143,10 +143,7 @@ The `restricted` SCC:
143
143
* Allows pods to use any FSGroup
144
144
* Allows pods to use any supplemental group
145
145
146
-
[NOTE]
147
-
====
148
-
The restricted SCC is the most restrictive of the SCCs that ship by default with the system. However, you can create a custom SCC that is even more restrictive. For example, you can create an SCC that restricts `readOnlyRootFS` to `true` and `allowPrivilegeEscalation` to `false`.
149
-
====
146
+
In clusters that were upgraded from {product-title} 4.10 or earlier, this SCC is available for use by any authenticated user. The `restricted` SCC is no longer available to users of new {product-title} 4.11 installations, unless the access is explicitly granted.
150
147
151
148
|`restricted-v2`
152
149
| Like the `restricted` SCC, but with the following differences:
@@ -156,6 +153,13 @@ The restricted SCC is the most restrictive of the SCCs that ship by default with
156
153
* `seccompProfile` is set to `runtime/default` by default.
157
154
* `allowPrivilegeEscalation` must be unset or set to `false` in security contexts.
158
155
156
+
This is the most restrictive SCC provided by a new installation and will be used by default for authenticated users.
157
+
158
+
[NOTE]
159
+
====
160
+
The `restricted-v2` SCC is the most restrictive of the SCCs that is included by default with the system. However, you can create a custom SCC that is even more restrictive. For example, you can create an SCC that restricts `readOnlyRootFilesystem` to `true`.
161
+
====
162
+
159
163
|===
160
164
161
165
[id="scc-settings_{context}"]
@@ -202,7 +206,7 @@ The containers use the capabilities from this default list, but pod manifest aut
202
206
203
207
[NOTE]
204
208
====
205
-
You can drop all capabilites from containers by setting the `requiredDropCapabilities` parameter to `ALL`.
209
+
You can drop all capabilites from containers by setting the `requiredDropCapabilities` parameter to `ALL`. This is what the `restricted-v2` SCC does.
0 commit comments