Learn about how authentication and authorization work in Kubernetes, the different methodologies for each, and how to extend your kube infrastructure to support this.
- [Instructor] Authentication and authorization are…two of the most common topics that arise when folks…are trying to integrate Kubernetes…into their infrastructure.…In this section, I'll go over what these features are,…and give you a working understanding of how authentication…and authorization work.…From an architecture perspective,…users who are trying to access the Kubernetes API,…via the kubectl command,…first have to be authenticated to access the API.…And then authorized to run specific actions.…Occasionally, users will also need to…have admission control to approve or reject a request.…
First off, we need to understand what a user means…from a Kubernetes context.…There are actually two kinds of users.…Normal users, like you and me,…and service accounts which are internal users to the system.…We typically think of normal users as users who are in an…LDAP or an SSO system in our enterprises.…From a Kubernetes perspective, these users are…managed outside of Kubernetes.…Service accounts are managed by the Kube API server,…
- What is containerization?
- Kubernetes features
- Clusters, nodes, and pods
- Deployments, jobs, and services
- Getting an application up and running
- Working with labels
- Handling application upgrades
- Dealing with configuration data
- Running jobs
- Production deployments
- Monitoring and logging
- Security in Kubernetes
Skill Level Intermediate
Q: This course was updated on 06/14/2018. What changed?
A: The following topic was updated: breaking down the Hello World application.