Authorizing Requests and Creating a Cluster

Learn about various authorization methods and choose one for our use.

Authorization methods

Just like almost everything else in Kubernetes, authorization is modular. We can choose to use Node, ABAC, Webhook, or RBAC authorization.

  • Node: Node authorization grants permissions to kubelets based on the Pods they are scheduled to run.

  • ABAC: Attribute-based access control (ABAC) is based on attributes combined with policies and is considered deprecated in favor of RBAC.

  • Webhooks: Webhooks are used for event notifications through HTTP POST requests.

  • RBAC: Role-based access control (RBAC) grants (or denies) access to resources based on the roles of individual users or groups.

Role-based access control (RBAC)

Among the four authorization methods, RBAC is the right choice for user-based authorization. Since we’re focusing on the exploration of the means to authorize humans, RBAC will be our primary focus.

RBAC can be used in the following ways:

  • We can use it to secure the cluster by allowing access only to authorized users.

  • We can define roles that would grant different levels of access to users and groups. Some could have permissions that would allow them to do almost anything, while others could be limited only to basic non-destructive operations. There can be many other roles in between.

  • We can combine RBAC with namespaces and allow users to operate only within specific segments of a cluster.

  • There are many other combinations we could apply depending on particular use cases.

We’ll explore the details through a few examples. As you might already suspect, we’ll start with a new k3d cluster.

Get hands-on with 1400+ tech skills courses.