Accessing the Cluster as a User
In this lesson, we will impersonate John and try to get the access authenticated.
We'll cover the following
Authentication
Since John is not around, we’ll do some role-playing and impersonate him.
Configuring kubectl
John will first have to set the cluster using the address and the certificate authority we sent him.
Get hands-on with 1400+ tech skills courses.