About Kubernetes Authentication

Written by sudip-sengupta | Published 2020/07/11
Tech Story Tags: kubernetes | docker | serverless | cloud-computing | kubernetes-authentication | authentication | programming | about-kubernetes-auth | web-monetization

TLDR Kubernetes uses authentication, Authorization and Admission to enforce security access and permissions. There are 3 steps that are taken in the authentication process. The first thing in Authentication is Identity, Identity and Identity Identity Identity. The two minimal methods required are - Service account tokens for service accounts and at least one other method of user authentication. The API server reads bearer tokens from a file when given the option "Bearer" on the command line. The token list cannot be changed without restarting the API server, and the token list can't be changed.via the TL;DR App

no story

Written by sudip-sengupta | Solution Architect | Technical Consultant
Published by HackerNoon on 2020/07/11