Skip to content

Commit

Permalink
rbac: add information on unauthenticated discovery roles (#10212)
Browse files Browse the repository at this point in the history
The Product Security Team got a report about these unauthenticated
discovery roles. The reporter was surprised about getting 200 requests
when unauthenticated. And given the light documentation on the intention
of these roles it is justifiable.

Increase documentation on these roles.
  • Loading branch information
philips authored and k8s-ci-robot committed Sep 7, 2018
1 parent 2917c69 commit 47d4c63
Showing 1 changed file with 10 additions and 0 deletions.
10 changes: 10 additions & 0 deletions content/en/docs/reference/access-authn-authz/rbac.md
Original file line number Diff line number Diff line change
Expand Up @@ -452,6 +452,16 @@ Auto-reconciliation is enabled in Kubernetes version 1.6+ when the RBAC authoriz

### Discovery Roles

Default role bindings authorize unauthenticated and authenticated users to read API information that is deemed safe to be publicly accessible. To disable anonymous unauthenticated access add `--anonymous-auth=false` to the API server configuration.

To view the configuration of these roles via `kubectl` run:

```
kubectl get clusterroles system:discovery -o yaml
```

NOTE: editing the role is not recommended as changes will be overwritten on API server restart via auto-reconciliation (see above).

<table>
<colgroup><col width="25%"><col width="25%"><col></colgroup>
<tr>
Expand Down

0 comments on commit 47d4c63

Please sign in to comment.