Introduction
    • PDF

    Introduction

    • PDF

    Article Summary

    This document describes the steps to configure the Kubernetes connector with the Britive application.

    The users can access the Kubernetes cluster and its components via various permissions defined within roles. The users can be bound to roles individually or via Groups; hence JIT access can be achieved by creating ephemeral RoleBindings or mapping users to group/s on an as-needed basis. The following sections discuss various aspects of enabling JIT access into clusters, managing role bindings, and maintaining zero-standing privileges using Britive.

    For more information about Kubernetes cluster authentication and RBAC authorization see the following Kubernetes documentation:


    Was this article helpful?

    What's Next