mirror of
https://github.com/optim-enterprises-bv/vault.git
synced 2025-10-30 02:02:43 +00:00
@@ -39,7 +39,7 @@ management tool.
|
||||
|
||||
It's necessary to ensure that the service account Vault uses will have permissions to manage
|
||||
service account tokens, and optionally manage service accounts, roles, and role bindings. These
|
||||
permissions can be managed using a Kuberentes role or cluster role. The role is attached to the
|
||||
permissions can be managed using a Kubernetes role or cluster role. The role is attached to the
|
||||
Vault service account with a role binding or cluster role binding.
|
||||
|
||||
For example, a minimal cluster role to create service account tokens is:
|
||||
@@ -321,7 +321,7 @@ $ vault write kubernetes/roles/auto-managed-sa-role \
|
||||
|
||||
~> **Note**: Vault's service account will also need access to the resources it is granting
|
||||
access to. This can be done for the examples above with `kubectl -n test create rolebinding --role test-role-list-pods --serviceaccount=vault:vault vault-test-role-abilities`.
|
||||
This is how Kuberentes prevents privilege escalation.
|
||||
This is how Kubernetes prevents privilege escalation.
|
||||
You can read more in the
|
||||
[Kubernetes RBAC documentation](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#privilege-escalation-prevention-and-bootstrapping).
|
||||
|
||||
|
||||
Reference in New Issue
Block a user