-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Learning Kubernetes Security - Second Edition
By :
All requests in Kubernetes originate from external users, service accounts, or Kubernetes components. If the origin of the request is unknown, it is treated as an anonymous request. Depending on the configuration of the components, anonymous requests can be allowed or dropped by the authentication modules. In v1.6+, anonymous access is allowed to support anonymous and unauthenticated users for the RBAC and ABAC authorization modes. It can be explicitly disabled by passing the --anonymous-auth=false flag to the API server configuration, as you can see in Figure 7.2:

Figure 7.2 – Disable anonymous authentication
Kubernetes uses one or more authentication strategies. Let’s discuss them one by one.
Using X.509 Certificate Authority (CA) certificates is the most common authentication strategy in Kubernetes. It is best suited for machine-to-machine authentication. It can be enabled by passing --client-ca-file...