6

Integrating Authentication into Your Cluster

Once a cluster has been built, users will need to interact with it securely. For most enterprises, this means authenticating individual users and pipelines, making sure they can only access what they need in order to do their jobs. This is known as least privileged access. The principle of least privilege is a security practice that centers on providing users, systems, applications, or processes with only the essential access and permissions required to execute their tasks. With Kubernetes, this can be challenging because a cluster is a collection of APIs, not an application with a frontend that can prompt for authentication, nor does it provide a secure way to manage credentials on its own.

Failing ...

Get Kubernetes – An Enterprise Guide - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.