![[Kubernetes] RBAC (Role-Based Access Control, 역할 기반 접근 제어)](https://img1.daumcdn.net/thumb/R750x0/?scode=mtistory2&fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdna%2FbP6sMo%2FbtrEbFo7KPG%2FAAAAAAAAAAAAAAAAAAAAAAC-jmTB6_GuruLI4MGj48-j6DStRCPL0GIDLGAmvHFc%2Fimg.png%3Fcredential%3DyqXZFxpELC7KVnFOS48ylbz2pIh7yKj8%26expires%3D1753973999%26allow_ip%3D%26allow_referer%3D%26signature%3DhHF%252FKa12Dh5jCk7oP4i5z5Tbeu0%253D)
DevOps/Kubernetes2022. 6. 7. 10:35[Kubernetes] RBAC (Role-Based Access Control, 역할 기반 접근 제어)
🚀 RBAC : Role-Based Access Control Using RBAC Authorization | Kubernetes Role: 권한(NS) ClusterRole: 권한(Global) RoleBinding Role ↔ RoleBinding ↔ SA/User ClusterRoleBinding ClusterRole ↔ ClusterRoleBinding ↔ SA/User vagrant@k8s-node1 ~/pod kubectl api-resources | grep rbac clusterrolebindings rbac.authorization.k8s.io/v1 false ClusterRoleBinding clusterroles rbac.authorization.k8s.io/v1 false C..