Downloads: 0 | Views: 62
Informative Article | Engineering Science | India | Volume 8 Issue 8, August 2019 | Rating: 4.1 / 10
Enhance the Application Security using Kubernetes Role Based Access Control for Applications
Pallavi Priya Patharlagadda [3]
Abstract: The goal of an identity and access management system is to guarantee that you have control over who can access your information system and what can be accessed by users. Since it is one of the core procedures in security management, it needs to be handled carefully. Identity and user management in Kubernetes should be handled via third-party IAM solutions such as Keycloak, Active Directory, Google's IAM, etc. as these are not incorporated into the platform itself. On the other side, Kubernetes manages authorization and authentication. This article will concentrate on the authorization features of Kubernetes' Identity and Access Management (IAM), particularly on how to use the Role-Based Access Control model to ensure that a user has the appropriate permissions for the appropriate resources.
Keywords: identity and access management, Kubernetes security, IAM solutions, rolebased access control, user authorization
Edition: Volume 8 Issue 8, August 2019,
Pages: 2339 - 2342