What does authorization answer in Kubernetes after a user has been authenticated?
Authorization answers what actions that user or process is allowed to perform in the cluster after access has already been granted.
Why is authorization necessary in a Kubernetes cluster?
Authorization is necessary because different users and applications should have different levels of access instead of everyone having full administrator privileges.
What kinds of actions might a cluster administrator be able to perform that should not be given to every user?
An administrator may be able to view create update and delete cluster resources and also change node storage and networking related configuration.
Why should developers usually have limited permissions compared to cluster administrators?
Developers may need to deploy and view applications but usually should not be allowed to modify critical cluster infrastructure such as nodes storage or networking.
How can authorization help when multiple teams share one cluster using namespaces?
Authorization can restrict users so they can work only inside their own namespaces and not affect workloads or resources belonging to other teams.
Which Kubernetes component evaluates authorization for requests coming into the cluster?
The kube API server evaluates authorization for requests after authenticating them.
What authorization mechanism is used for kubelets or nodes inside the cluster?
The node authorizer is used for kubelets and other node related requests coming from identities that belong to the system nodes group.
What identity pattern must a kubelet follow for the node authorizer to recognize it properly?
A kubelet should use a username prefixed with system node and belong to the system nodes group.
What is attribute based access control in Kubernetes?
Attribute based access control maps a user or group directly to a set of permissions through policy definitions.
Why is attribute based access control considered difficult to manage?
It is difficult to manage because policy files must be edited manually and the kube API server must be restarted when changes are made.
What is the core idea of role based access control in Kubernetes?
Role based access control defines permissions in roles and then assigns users or groups to those roles instead of attaching permissions directly to each user.
Why is role based access control easier to manage than attribute based access control?
It is easier because you can change the permissions in one role and all users bound to that role receive the updated access immediately.
What is the purpose of the webhook authorization mode?
Webhook authorization lets Kubernetes send authorization decisions to an external system such as Open Policy Agent which decides whether the request should be allowed.
What do the AlwaysAllow and AlwaysDeny authorization modes do?
AlwaysAllow approves every request without checks and AlwaysDeny rejects every request.
How do you configure authorization modes on the kube API server?
Authorization modes are configured using the authorization mode option on the kube API server.
What is the default authorization mode if none is explicitly configured according to the lecture?
The default authorization mode is AlwaysAllow.
Can Kubernetes use multiple authorization modes at the same time?
Yes Kubernetes can use multiple authorization modes by listing them in order as a comma separated chain.
How does Kubernetes evaluate requests when multiple authorization modes are configured?
Kubernetes checks the request against each mode in order and if one authorizer approves the request the checking stops and access is granted.
What happens when one authorization module denies a request in a multi mode chain?
The request is passed to the next authorization module in the chain for evaluation.
In the lecture example with node RBAC and webhook configured why would a normal user request move past the node authorizer?
The node authorizer mainly handles node related identities so a normal user request would not match it and would continue to the next authorizer such as RBAC.
Which authorization mechanism is presented in the lecture as the standard and most manageable built in approach?
Role based access control is presented as the standard and more manageable built in authorization approach.