
Re-organized topic hierarchy Tiny edit to restart review workflow. Squashed with Resolved index.rst conflict commit Change-Id: I13472792cb19d1e9975ac76c6954d38054d606c5 Signed-off-by: Keane Lim <keane.lim@windriver.com> Signed-off-by: MCamp859 <maryx.camp@intel.com>
28 lines
938 B
ReStructuredText
28 lines
938 B
ReStructuredText
|
|
.. oud1564679022947
|
|
.. _kubernetes-service-accounts:
|
|
|
|
===========================
|
|
Kubernetes Service Accounts
|
|
===========================
|
|
|
|
|prod| uses Kubernetes service accounts and Kubernetes |RBAC| policies to
|
|
identify and manage remote access to Kubernetes resources using the
|
|
Kubernetes API, kubectl CLI or the Kubernetes Dashboard.
|
|
|
|
.. note::
|
|
|prod| can also use user accounts defined in an external Windows Active
|
|
Directory to authenticate Kubernetes API, :command:`kubectl` CLI or the
|
|
Kubernetes Dashboard. For more information, see :ref:`Configure OIDC
|
|
Auth Applications <configure-oidc-auth-applications>`.
|
|
|
|
You can create and manage Kubernetes service accounts using
|
|
:command:`kubectl` as shown below.
|
|
|
|
.. note::
|
|
It is recommended that you create and manage service accounts within the
|
|
kube-system namespace. See :ref:`Create an Admin Type Service
|
|
Account <create-an-admin-type-service-account>`
|
|
|
|
|