Skip to content

Access Control

Users access the Kubernetes API using kubectl, client libraries, or by making REST requests. Both human users and Kubernetes service accounts can be authorized for API access. When a request reaches the API, it goes through several stages, illustrated in the following diagram. See also Controlling Access to the Kubernetes API for more in-depth information:

Access Control Overview

To put it simply, we could describe each stage as follows:

Stage What It Asks Purpose
Authentication Who are you? Verifies the identity of the user or service account.
Authorization Are you allowed to do this? Checks whether the authenticated identity has the required permissions.
Admission Control Does this follow the rules? Applies custom rules and policies before allowing the request.

Learn more by visiting the following pages:

  • Authentication
    Describes how user authentication within SCK clusters works.
  • Authorization
    Describes how user authorization within SCK clusters works.