Authorization
Within workspaces, KCP implements the same RBAC-based authorization mechanism as Kubernetes. Other authorization schemes (i.e. ABAC) are not supported. Generally, the same (cluster) role and (cluster) role binding principles apply exactly as in Kubernetes.
In addition, additional RBAC semantics is implemented cross-workspaces, namely the following:
- Top-Level Organization access: the user must have this as pre-requisite to access any other workspace, or is even member and by that can create workspaces inside the organization workspace.
- Workspace Content access: the user needs access to a workspace or is even admin.
- for some resources, additional permission checks are performed, not represented by local or Kubernetes standard RBAC rules. E.g.
- workspace creation checks for organization membership (see above).
- workspace creation checks for
use
verb on theWorkspaceType
. - API binding via APIBinding objects requires verb
bind
access to the correspondingAPIExport
. - System Workspaces access: system workspaces are prefixed with
system:
and are not accessible by users.
The details of the authorizer chain are documented in Authorizers.
Pages
Authorizers
How to authorize requests to kcp.