tencent cloud

Tencent Kubernetes Engine

소식 및 공지 사항
릴리스 노트
제품 릴리스 기록
제품 소개
제품 장점
제품 아키텍처
시나리오
제품 기능
리전 및 가용존
빠른 시작
신규 사용자 가이드
표준 클러스터를 빠르게 생성
Demo
클라우드에서 컨테이너화된 애플리케이션 배포 Check List
TKE 표준 클러스터 가이드
Tencent Kubernetes Engine(TKE)
클러스터 관리
네트워크 관리
스토리지 관리
Worker 노드 소개
Kubernetes Object Management
워크로드
클라우드 네이티브 서비스 가이드
Tencent Managed Service for Prometheus
TKE Serverless 클러스터 가이드
TKE 클러스터 등록 가이드
실습 튜토리얼
Serverless 클러스터
네트워크
로그
모니터링
유지보수
DevOps
탄력적 스케일링
자주 묻는 질문
클러스터
TKE Serverless 클러스터
유지보수
서비스
이미지 레지스트리
원격 터미널
문서Tencent Kubernetes Engine

Using Preset Identity Authorization

포커스 모드
폰트 크기
마지막 업데이트 시간: 2024-12-11 18:50:30

Description of Preset Roles

The Tencent Kubernetes Engine (TKE) console provides fine-grained permission control for Kubernetes resources based on Kubernetes’ native Role-Based Access Control (RBAC) authorization policies. It also provides the preset roles Role and ClusterRole, which are described below:

Role

The TKE console provides an access management page for which the root account and cluster creator by default have administrator permissions and can manage sub-accounts that have the DescribeCluster Action permission for a given cluster. See the following figure for more information.



ClusterRole

For all namespaces:
Administrators (tke:admin): have read/write permission for the resources in all namespaces, read/write permission for cluster nodes, storage volumes, namespaces, and quotas, and read/write permission for sub-account configurations.
OPS personnel (tke:ops): have read/write permission for the resources visible on the console in all namespaces and read/write permission for cluster nodes, storage volumes, namespaces, and quotas.
Developers (tke:dev): have read/write permission for the resources visible on the console in all namespaces.
Restricted personnel (tke:ro): have read-only permission for the resources visible on the console in all namespaces.
Custom: user-defined ClusterRole.
For a specified namespace:
Developers (tke:ns:dev): have read/write permission for the resources visible on the console in a specified namespace.
Read-only users (tke:ns:ro): have read-only permission for the resources visible on the console in a specified namespace.
All the preset ClusterRole policies contain the fixed label: cloud.tencent.com/tke-rbac-generated: "true".
All the preset ClusterRoleBinding policies contain the fixed annotation: cloud.tencent.com/tke-account-nickname: yournickname and the label: cloud.tencent.com/tke-account: "yourUIN".

Directions

Obtaining credentials

TKE will create independent credentials for each sub-account by default. You only need to access the cluster details page or call the Tencent Cloud API DescribeClusterKubeconfig to obtain the credential file Kubeconfig of the current account. The procedure for obtaining the file on the console is as follows:
1. Log in to the TKE console and click Cluster on the left sidebar.
2. On the Cluster Management page, click the ID of the target cluster.
3. On the cluster details page, select Basic Information on the left sidebar. Then, you can view and download the Kubeconfig file in the Cluster APIServer information section, as shown in the following figure.



Managing credentials

Cluster administrators can access the credential management page to view and update the cluster credentials of all accounts. For more information, see Updating the TKE cluster access credentials of sub-accounts.

Authorization

Note:
Please contact cluster administrators (root accounts, cluster creators, or users with the admin role) for authorization.
1. On the Cluster Management page, click the ID of the target cluster.
2. On the cluster details page, select Authorization Management -> ClusterRoleBinding on the left sidebar.
3. On the ClusterRoleBinding page, click RBAC Policy Generator, as shown in the following figure.



4. When you select a sub-account on the Administration Permissions page, select the target sub-account and click Next.
5. When you set the cluster RBAC, set the permissions as follows:
Namespace List: specify the namespaces for which the permissions apply.
Permissions: please reference the descriptions provided on the page and set permissions as needed.
Note:
You can also click Add Permission to set custom permissions.

Authentication

Log in to your sub-account and verify that the sub-account has the permissions in question. If so, this indicates that the authorization was successful.

도움말 및 지원

문제 해결에 도움이 되었나요?

피드백