July 2019
Intermediate to advanced
502 pages
14h
English
Authentication and authorization are very well-known and familiar mechanisms for access control (although not easy to implement robustly). Admission is yet another step that follows authorization. Even if a request is authenticated and authorized, it may not be possible to satisfy the request at the moment. This could be due to a rate limit or some other intermittent issue on the server side. Kubernetes implements additional capabilities, such as mutating requests as part of admission. For your own microservices, it may not be needed.
So far, we have discussed accounts, secrets, and access control. However, there's still a lot of work to be done in order to get closer to a secure and hardened cluster.