
Simplify Kubernetes Resource Access Control using RBAC Impersonation
Introduction
Kubernetes, like any other secure system, supports the following concepts:
* Authentication: Verifying and proving identities for users and groups, and service accounts
* Authorization: Allowing users to perform specific actions with Kubernetes resources
* Accounting: Storing subjects actions, typically for auditing purposes
Authorization – the process of handling users’ access to resources