Kubernetes authentication
All requests in Kubernetes originate from external users, service accounts, or Kubernetes components. If the origin of the request is unknown, it is treated as an anonymous request. Depending on the configuration of the components, anonymous requests can be allowed or dropped by the authentication modules. In v1.6+, anonymous access is allowed to support anonymous and unauthenticated users for the RBAC and ABAC authorization modes. It can be explicitly disabled by passing the --anonymous-auth=false
flag to the API server configuration:
$ps aux | grep api root 3701 6.1 8.7 497408 346244 ? Ssl 21:06 0:16 kube-apiserver --advertise-address=192.168.99.111 --allow-privileged=true --anonymous-auth=false
Kubernetes uses one or more of these authentication strategies. Let's discuss them one by one.
Client certificates
Using X509 Certificate...