Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 72 for authorizer (0.33 sec)

  1. CHANGELOG/CHANGELOG-1.30.md

       ([#123611](https://github.com/kubernetes/kubernetes/pull/123611), [@ritazh](https://github.com/ritazh))
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Wed Jun 18 18:59:10 UTC 2025
    - 398.1K bytes
    - Viewed (0)
  2. CHANGELOG/CHANGELOG-1.18.md

    - Improves performance of the node authorizer ([#87696](https://github.com/kubernetes/kubernetes/pull/87696), [@liggitt](https://github.com/liggitt)) [SIG Auth]
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Wed Jun 16 17:18:28 UTC 2021
    - 373.2K bytes
    - Viewed (0)
  3. CHANGELOG/CHANGELOG-1.6.md

    ### RBAC
    * The `attributeRestrictions` field has been removed from the PolicyRule type in the rbac.authorization.k8s.io/v1alpha1 API. The field was not used by the RBAC authorizer. ([#39625](https://github.com/kubernetes/kubernetes/pull/39625), [@deads2k](https://github.com/deads2k))
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Thu Dec 24 02:28:26 UTC 2020
    - 304K bytes
    - Viewed (0)
  4. CHANGELOG/CHANGELOG-1.8.md

    ## Changelog since v1.8.0-beta.1
    
    ### Action Required
    
    * New GCE or GKE clusters created with `cluster/kube-up.sh` will not enable the legacy ABAC authorizer by default. If you would like to enable the legacy ABAC authorizer, export ENABLE_LEGACY_ABAC=true before running `cluster/kube-up.sh`. ([#51367](https://github.com/kubernetes/kubernetes/pull/51367), [@cjcullen](https://github.com/cjcullen))
    
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Tue Feb 20 15:45:02 UTC 2024
    - 312.2K bytes
    - Viewed (0)
  5. CHANGELOG/CHANGELOG-1.28.md

    - In the course of admitting a single request, the ValidatingAdmissionPolicy plugin will perform no more than one authorization check per unique authorizer expression. All evaluations of identical authorizer expressions will produce the same decision. ([#116443](https://github.com/kubernetes/kubernetes/pull/116443), [@benluddy](https://github.com/benluddy)) [SIG API Machinery and Testing]
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Wed Oct 23 20:13:20 UTC 2024
    - 456.9K bytes
    - Viewed (1)
  6. CHANGELOG/CHANGELOG-1.32.md

    - kube-apiserver: Promoted `AuthorizeWithSelectors` feature to beta, which includes field and label selector information from requests in webhook authorization calls. Promoted `AuthorizeNodeWithSelectors` feature to beta, which changes node authorizer behavior to limit requests from node API clients, so that each Node can only get / list / watch its own Node API object, and can also only get / list / watch Pod API objects bound to that node. Clients using kubelet credentials to read other nodes...
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Wed Aug 13 14:49:49 UTC 2025
    - 412.3K bytes
    - Viewed (0)
  7. CHANGELOG/CHANGELOG-1.7.md

            * Nodes must use client credentials that place them in the `system:nodes` group with a username of `system:node:<nodeName>` in order to be authorized by the node authorizer (the credentials obtained by the kubelet...
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Thu May 05 13:44:43 UTC 2022
    - 308.7K bytes
    - Viewed (1)
  8. CHANGELOG/CHANGELOG-1.27.md

    - Added authorization check support to the CEL expressions of ValidatingAdmissionPolicy via a `authorizer`
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Wed Jul 17 07:48:22 UTC 2024
    - 466.3K bytes
    - Viewed (2)
  9. CHANGELOG/CHANGELOG-1.9.md

    * Add support for the webhook authorizer to make a Deny decision that short-circuits the union authorizer and immediately returns Deny.  ([#53273](https://github.com/kubernetes/kubernetes/pull/53273), [@mikedanese](https://github.com/mikedanese))
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Tue Nov 16 10:46:27 UTC 2021
    - 313.7K bytes
    - Viewed (0)
  10. CHANGELOG/CHANGELOG-1.5.md

    * Use authorization to limit users' ability to use specific PodSecurityPolicy objects
    
    **What is the impact?**
    
    A user that is authorized to create pods can make use of any existing PodSecurityPolicy, even ones they are not authorized to use.
    
    **How can I mitigate this prior to installing 1.5.5?**
    
    1. Export existing PodSecurityPolicy objects:
      * `kubectl get podsecuritypolicies -o yaml > psp.yaml`
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Thu Dec 24 02:28:26 UTC 2020
    - 136.4K bytes
    - Viewed (0)
Back to top