May 2018
Intermediate to advanced
554 pages
13h 51m
English
As we mentioned in the previous section, real use cases with credentials and permissions cannot be ignored like walking cross insecure endpoints, just like in our demonstration. To avoid security issues, you may take the official documentation (found at https://kubernetes.io/docs/admin/authentication/) while granting permissions to users.