Authorization Flashcards

(21 cards)

1
Q

What does authorization answer in Kubernetes after a user has been authenticated?

A

Authorization answers what actions that user or process is allowed to perform in the cluster after access has already been granted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is authorization necessary in a Kubernetes cluster?

A

Authorization is necessary because different users and applications should have different levels of access instead of everyone having full administrator privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What kinds of actions might a cluster administrator be able to perform that should not be given to every user?

A

An administrator may be able to view create update and delete cluster resources and also change node storage and networking related configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why should developers usually have limited permissions compared to cluster administrators?

A

Developers may need to deploy and view applications but usually should not be allowed to modify critical cluster infrastructure such as nodes storage or networking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can authorization help when multiple teams share one cluster using namespaces?

A

Authorization can restrict users so they can work only inside their own namespaces and not affect workloads or resources belonging to other teams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which Kubernetes component evaluates authorization for requests coming into the cluster?

A

The kube API server evaluates authorization for requests after authenticating them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What authorization mechanism is used for kubelets or nodes inside the cluster?

A

The node authorizer is used for kubelets and other node related requests coming from identities that belong to the system nodes group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What identity pattern must a kubelet follow for the node authorizer to recognize it properly?

A

A kubelet should use a username prefixed with system node and belong to the system nodes group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is attribute based access control in Kubernetes?

A

Attribute based access control maps a user or group directly to a set of permissions through policy definitions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is attribute based access control considered difficult to manage?

A

It is difficult to manage because policy files must be edited manually and the kube API server must be restarted when changes are made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the core idea of role based access control in Kubernetes?

A

Role based access control defines permissions in roles and then assigns users or groups to those roles instead of attaching permissions directly to each user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is role based access control easier to manage than attribute based access control?

A

It is easier because you can change the permissions in one role and all users bound to that role receive the updated access immediately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of the webhook authorization mode?

A

Webhook authorization lets Kubernetes send authorization decisions to an external system such as Open Policy Agent which decides whether the request should be allowed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do the AlwaysAllow and AlwaysDeny authorization modes do?

A

AlwaysAllow approves every request without checks and AlwaysDeny rejects every request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do you configure authorization modes on the kube API server?

A

Authorization modes are configured using the authorization mode option on the kube API server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the default authorization mode if none is explicitly configured according to the lecture?

A

The default authorization mode is AlwaysAllow.

17
Q

Can Kubernetes use multiple authorization modes at the same time?

A

Yes Kubernetes can use multiple authorization modes by listing them in order as a comma separated chain.

18
Q

How does Kubernetes evaluate requests when multiple authorization modes are configured?

A

Kubernetes checks the request against each mode in order and if one authorizer approves the request the checking stops and access is granted.

19
Q

What happens when one authorization module denies a request in a multi mode chain?

A

The request is passed to the next authorization module in the chain for evaluation.

20
Q

In the lecture example with node RBAC and webhook configured why would a normal user request move past the node authorizer?

A

The node authorizer mainly handles node related identities so a normal user request would not match it and would continue to the next authorizer such as RBAC.

21
Q

Which authorization mechanism is presented in the lecture as the standard and most manageable built in approach?

A

Role based access control is presented as the standard and more manageable built in authorization approach.