A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://docs.aws.amazon.com/eks/latest/userguide/access-entries.html below:

Grant IAM users access to Kubernetes with EKS access entries

Grant IAM users access to Kubernetes with EKS access entries

This section is designed to show you how to manage IAM principal access to Kubernetes clusters in Amazon Elastic Kubernetes Service (EKS) using access entries and policies. You’ll find details on changing authentication modes, migrating from legacy aws-auth ConfigMap entries, creating, updating, and deleting access entries, associating policies with entries, reviewing predefined policy permissions, and key prerequisites and considerations for secure access management.

Overview

EKS access entries are the best way to grant users access to the Kubernetes API. For example, you can use access entries to grant developers access to use kubectl. Fundamentally, an EKS access entry associates a set of Kubernetes permissions with an IAM identity, such as an IAM role. For example, a developer may assume an IAM role and use that to authenticate to an EKS Cluster.

Features How to attach permissions

You can attach Kubernetes permissions to access entries in two ways:

Considerations

When enabling EKS access entries on existing clusters, keep the following in mind:

Get started
  1. Determine the IAM Identity and Access policy you want to use.

  2. Enable EKS Access Entries on your cluster. Confirm you have a supported platform version.

  3. Create an access entry that associates an IAM Identity with Kubernetes permission.

  4. Authenticate to the cluster using the IAM identity.


RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4