
Re-organized topic hierarchy Tiny edit to restart review workflow. Squashed with Resolved index.rst conflict commit Change-Id: I13472792cb19d1e9975ac76c6954d38054d606c5 Signed-off-by: Keane Lim <keane.lim@windriver.com> Signed-off-by: MCamp859 <maryx.camp@intel.com>
35 lines
1.5 KiB
ReStructuredText
35 lines
1.5 KiB
ReStructuredText
|
|
.. pui1590088143541
|
|
.. _pod-security-policies:
|
|
|
|
=====================
|
|
Pod Security Policies
|
|
=====================
|
|
|
|
|PSPs| enable fine-grained authorization of pod creation and updates.
|
|
|
|
|PSPs| control access to security sensitive aspects of Pod specifications
|
|
such as running of privileged containers, use of host filesystem, running as
|
|
root, etc. |PSPs| define a set of conditions that a pod must run with, in
|
|
order to be accepted into the system, as well as defaults for the related
|
|
fields. |PSPs| are assigned to users through Kubernetes |RBAC| RoleBindings.
|
|
See `https://kubernetes.io/docs/concepts/policy/pod-security-policy/
|
|
<https://kubernetes.io/docs/concepts/policy/pod-security-policy/>`__ for
|
|
details.
|
|
|
|
When enabled, Pod security policy checking will authorize all Kubernetes
|
|
API commands against the |PSPs| which the issuer of the command has access
|
|
to. If there are no |PSPs| defined in the system or the issuer does not have
|
|
access to any |PSPs|, the Pod security policy checking will fail to authorize
|
|
the command.
|
|
|
|
|prod-long| provides a system service-parameter to enable Pod security
|
|
policy checking. In addition to enabling Pod security policy checking,
|
|
setting this service parameter also creates two |PSPs| \(privileged and
|
|
restricted\) such that users with cluster-admin role \(which has access to
|
|
all resources\) has |PSPs| to authorize against. It also creates two
|
|
corresponding roles for specifying access to these |PSPs|
|
|
\(privileged-psp-user and restricted-psp-user\), for binding to other
|
|
non-admin type subjects.
|
|
|