TKE supports the Kubernetes RBAC authorization method, allowing you to perform fine-grained access control for sub-accounts. With this authorization method, you can access resources in a cluster through the TKE console and kubectl. For more information, see the following figure.
Role-Based Access Control (RBAC) associates users and permissions with roles to indirectly grant permissions to users.
In Kubernetes, RBAC is implemented through the rbac.authorization.k8s.io
API group, which allows cluster administrators to dynamically configure policies through Kubernetes APIs.
A Role is used to define access permissions for resources in a single namespace.
A ClusterRole is used to define access permissions for resources in an entire cluster.
RoleBinding grants the permissions defined in a role to a user or group of users in order to grant authorization for a namespace.
ClusterRoleBinding grants the permissions defined in a role to a user or group of users in order to grant cluster-wide authorization.
For more information, see the Kubernetes official documentation.
Kubernetes API servers support various verification policies, such as x509 certificates, bearer tokens, and basic auth. Of these, only individual bearer token verification policies support verification based on the tokens of specified known-token csv files, such as bearer tokens, serviceaccount tokens, OIDC tokens, and webhook token servers.
With implementation complexity and different usage scenarios in mind, TKE has chosen to use x509 certificates as the verification method. This verification method offers the following advantages:
TKE implements the following features based on x509 certificate verification:
tke:admin
permission for a cluster can view and update the certificates of other sub-accounts.Kubernetes supports two main authorization methods: RBAC and Webhook Server. In order to provide a consistent experience for users who are familiar with and work with native Kubernetes, TKE has chosen RBAC as its authorization method. This authorization method provides preset Roles and ClusterRoles. You only need to create the corresponding RoleBinding or ClusterRoleBinding to implement authorizations for a cluster or namespace. This authorization method has the following advantages:
By using the authorization management feature provided by TKE, you can perform more fine-grained permission control. For example, you can configuring sets of permissions such as assigning read-only permissions to a sub-account or assigning read/write permissions to only a certain namespace under a sub-account. For more information on configuring more fine-grained sets of permissions for sub-accounts, see the following documents:
Was this page helpful?