Kubernetes
  • Documentation
  • Kubernetes Blog
  • Training
  • Careers
  • Partners
  • Community
  • Versions
    Release Information v1.33 v1.32 v1.31 v1.30 v1.29
  • English
    中文 (Chinese) Français (French) Deutsch (German) Bahasa Indonesia (Indonesian) 한국어 (Korean) Español (Spanish)
  1. Kubernetes Documentation
  2. Reference
  3. API Access Control

API Access Control

For an introduction to how Kubernetes implements and controls API access, read Controlling Access to the Kubernetes API.

Reference documentation:

  • Authenticating
    • Authenticating with Bootstrap Tokens
  • Admission Controllers
    • Dynamic Admission Control
  • Authorization
    • Role Based Access Control
    • Attribute Based Access Control
    • Node Authorization
    • Webhook Authorization
  • Certificate Signing Requests
    • including CSR approval and certificate signing
  • Service accounts
    • Developer guide
    • Administration
  • Kubelet Authentication & Authorization
    • including kubelet TLS bootstrapping

Feedback

Was this page helpful?

Thanks for the feedback. If you have a specific, answerable question about how to use Kubernetes, ask it on Stack Overflow. Open an issue in the GitHub Repository if you want to report a problem or suggest an improvement.

Last modified June 26, 2025 at 3:34 AM PST: Merge pull request #51077 from lmktfy/20250526_tweak_hpa_good_practise (a2145d1)
Edit this page Create child page Create an issue Print entire section

© 2025 The Kubernetes Authors | Documentation Distributed under CC BY 4.0

© 2025 The Linux Foundation ®. All rights reserved. The Linux Foundation has registered trademarks and uses trademarks. For a list of trademarks of The Linux Foundation, please see our Trademark Usage page

ICP license: 京ICP备17074266号-3