Kubernetes User Operations: Difference between revisions
Jump to navigation
Jump to search
Line 4: | Line 4: | ||
=Internal= | =Internal= | ||
* [[Kubernetes_Security_Operations#User_Operations|Kubernetes Security Operations]] | * [[Kubernetes_Security_Operations#User_Operations|Kubernetes Security Operations]] | ||
* [[Kubernetes_Security_Concepts|Kubernetes Security Concepts]] | |||
=Add a Normal User via a Certificate= | =Add a Normal User via a Certificate= | ||
A user can authenticate against the Kubernetes cluster by being issued a certificate by the Kubernetes cluster and then present the certificate to the API call as the Certificate Header, or through [[kubectl]]. | A user can authenticate against the Kubernetes cluster by being issued a certificate by the Kubernetes cluster and then present the certificate to the API call as the Certificate Header, or through [[kubectl]]. |
Revision as of 23:28, 1 October 2020
External
Internal
Add a Normal User via a Certificate
A user can authenticate against the Kubernetes cluster by being issued a certificate by the Kubernetes cluster and then present the certificate to the API call as the Certificate Header, or through kubectl.