International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 0 | Views: 60

Informative Article | Engineering Science | India | Volume 8 Issue 8, August 2019 | Popularity: 4.1 / 10


     

Enhance the Application Security using Kubernetes Role Based Access Control for Applications

Pallavi Priya Patharlagadda


Abstract: The goal of an identity and access management system is to guarantee that you have control over who can access your information system and what can be accessed by users. Since it is one of the core procedures in security management, it needs to be handled carefully. Identity and user management in Kubernetes should be handled via third-party IAM solutions such as Keycloak, Active Directory, Google's IAM, etc. as these are not incorporated into the platform itself. On the other side, Kubernetes manages authorization and authentication. This article will concentrate on the authorization features of Kubernetes' Identity and Access Management (IAM), particularly on how to use the Role-Based Access Control model to ensure that a user has the appropriate permissions for the appropriate resources.


Keywords: identity and access management, Kubernetes security, IAM solutions, rolebased access control, user authorization


Edition: Volume 8 Issue 8, August 2019


Pages: 2339 - 2342



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Pallavi Priya Patharlagadda, "Enhance the Application Security using Kubernetes Role Based Access Control for Applications", International Journal of Science and Research (IJSR), Volume 8 Issue 8, August 2019, pp. 2339-2342, https://www.ijsr.net/getabstract.php?paperid=SR24829160051