Skip to main content

Authorization in Kubernetes

Required knowledge for the CKS certification.

What is Authorization?

Authorization in Kubernetes determines whether a user, service account, or component is allowed to perform a specific action on a given resource. Once authentication verifies who you are, authorization ensures you have the necessary permissions to proceed.


Types of Authorization Mechanisms in Kubernetes

Kubernetes supports multiple authorization mechanisms to control access and enforce policies effectively.

1. Role-Based Access Control (RBAC)

Required knowledge for the CKS certification.

  • Grants permissions based on Roles and RoleBindings.
  • Defines who can do what within a namespace or cluster-wide.
# Example: Creating an RBAC Role and RoleBinding
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: pod-reader
namespace: default
rules:
- apiGroups: [""]
resources: ["pods"]
verbs: ["get", "list", "watch"]

---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: pod-reader-binding
namespace: default
subjects:
- kind: User
name: example-user
apiGroup: rbac.authorization.k8s.io
roleRef:
kind: Role
name: pod-reader
apiGroup: rbac.authorization.k8s.io

Read more about RBAC


2. Attribute-Based Access Control (ABAC)

  • Uses policy files to define access rules.
  • Provides fine-grained access control but lacks scalability compared to RBAC.
{
"apiVersion": "abac.authorization.kubernetes.io/v1beta1",
"kind": "Policy",
"spec": {
"user": "example-user",
"namespace": "default",
"resource": "pods",
"readonly": true
}
}
  • Configure the API server to use ABAC:
kube-apiserver --authorization-policy-file=policy.json --authorization-mode=ABAC

Read more about ABAC


3. Node Authorization

Required knowledge for the CKS certification.

  • Allows Kubelets to access specific resources on behalf of nodes.
  • Ensures nodes cannot modify objects outside their scope.
# Example: Node authorization rule for reading secrets
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: node-reader
namespace: kube-system
rules:
- apiGroups: [""]
resources: ["secrets"]
verbs: ["get", "list"]
  • API server configuration for Node Authorization:
kube-apiserver --authorization-mode=Node,RBAC

Read more about Node Authorization


4. Webhook Authorization

Required knowledge for the CKS certification.

  • Delegates authorization decisions to an external API.
  • Useful for custom access control scenarios.
# Example webhook authorization configuration
apiVersion: v1
kind: Config
clusters:
- name: webhook
cluster:
server: https://auth.example.com/authorize
users:
- name: webhook
contexts:
- name: webhook
context:
cluster: webhook
user: webhook
current-context: webhook
  • API server configuration for Webhook Authorization:
kube-apiserver --authorization-mode=Webhook --authorization-webhook-config-file=/etc/kubernetes/authz-webhook-config.yaml

Read more about Webhook Authorization


Best Practices for Authorization

  1. Use RBAC Instead of ABAC:
    RBAC is scalable, manageable, and better integrated with Kubernetes security.

  2. Grant Least Privilege:

    • Assign minimal permissions to users and service accounts.
    • Regularly review and update RoleBindings.
  3. Restrict Node Access:

    • Ensure nodes only access their assigned workloads.
    • Limit Kubelet permissions to avoid privilege escalation.
  4. Secure API Server Authorization Modes:

    • Always enable RBAC (--authorization-mode=RBAC).
    • Use Webhook Authorization for external access control.
# Example: Enforcing RBAC and Webhook Authorization
kube-apiserver --authorization-mode=RBAC,Webhook

Conclusion: Authorization as the Key to Secure Access Control

Authorization ensures that only trusted users and components can perform specific actions in a Kubernetes cluster. Properly configuring RBAC, Node Authorization, and Webhook Authorization helps prevent unauthorized access, privilege escalation, and security breaches.