SlideShare a Scribd company logo
4
Most read
5
Most read
6
Most read
Kubernetes
Role Based Access Control (RBAC)
RBAC
About Me
Milan Das
https://github.com/dmilan77/kubernetes-rbac-presentation
Cloud Solution Architect (Equifax)
&
Photographer (when not working)
https://www.linkedin.com/in/milandas/
Milan Das
● Love to code (Java, Python, Scala, Spark)
● My Journey
○ Started with Java
○ IBM Middleware MQ/ETL
○ Camel ESB
○ BPM
○ Bigdata
○ Reactive Microservices : Akka, Domain Driven Design,
○ Cloud & Kubernetes
● My Son is 9 Years old. He plays Cricket
● Equifax: Data is our gold
Real Life Role Based Access (Driving a CDL)
Who Are You
Is Valid License ?
AuthN AuthZ
Identify Restictions
Assign car
RBAC in one-slide
RBAC is set of rules to map allowed operations on set of resources in a namespace (ns1) or cluster
Authorization and RBAC
● Default: Deny ALL
● Contains Subject-Verb-Resource-Namespace
Roles Vs Binding
● Role contains rules that represent a set of permissions.
● Binding grants the permissions defined in a role to a user or set of users
● Two types of roles/bindings:
○ Roles/RoleBinding: Scope is Namespace level
○ ClusterRoles/ClusterRoleBinding : Scope at cluster level.
Roles Example
Roles Cluster Roles
Binding Example
RoleBinding ClusterRoleBinding
User Management in Kubernetes ?
Expectation:
kubectl create user john
Kubectl create group adminns1
Kubectl add john to adminns1
No User Management in Kubernetes
Expectation:
kubectl create user john
Kubectl create group adminns1
Kubectl add john to adminns1
How to manage user ? User Plugin
● Certificate based Authentication (x509)
● Token based Authentication
● Basic Authentication
● OAuth2: OIDC
○ Third party: Dex, OpenUnison
https://kubernetes.io/docs/reference/access-authn-authz/authentication/#openid-connect-tokens
How OIDC works
JWT Token
Auth0 Authentication
● A OpenID Connect provider similar to
○ Auth0, github, google, Ping, SecureAuth, ADFS, Azure Active Directory
● The authentication flow looks like:
○ OAuth2 client logs a user in through Auth0.
○ That client uses the returned ID Token as a bearer token when talking to the Kubernetes API.
○ A claim designated as the username (and optionally group information) will be associated with that
request.
Demo time
Create RBAC based minikube cluster
Demo time: Configure Dashboard
● Configuring Secrets kube-dashboard-secrets
● Setup a minikube kubernetes dashboard using : openresty-oidc
○ https://hub.docker.com/r/myobplatform/openresty-oidc/
Demo time: Create RBAC role-bindings
● Create namespaces: ns1-namespace, ns2-namespace
● Deploy Role bindings:
○ ClusterRoleBinding (k8s-admin)
○ RoleBinding (ns1)
○ RoleBinding(ns2)
● Create user in auth0
Auth0 Extension
RBAC basd Kubernetes dashboard
Useful Links
https://aaronparecki.com/oauth-2-simplified/
https://github.com/dmilan77/kubernetes-rbac-presentation
https://jwt.io/
https://github.com/pvdvreede/kubernetes-auth-presentation/blob/master/PITCHME.md
https://www.youtube.com/watch?v=CnHTCTP8d48&t=1200s
Role based access control - RBAC - Kubernetes

More Related Content

PDF
Introduction to Kubernetes RBAC
PDF
User authentication and authorizarion in Kubernetes
PDF
What Is Kubernetes | Kubernetes Introduction | Kubernetes Tutorial For Beginn...
PDF
Kubernetes - Security Journey
PPTX
Kubernetes Basics
PPTX
Amazon EKS Deep Dive
PDF
Kubernetes - A Comprehensive Overview
PDF
Hands-On Introduction to Kubernetes at LISA17
Introduction to Kubernetes RBAC
User authentication and authorizarion in Kubernetes
What Is Kubernetes | Kubernetes Introduction | Kubernetes Tutorial For Beginn...
Kubernetes - Security Journey
Kubernetes Basics
Amazon EKS Deep Dive
Kubernetes - A Comprehensive Overview
Hands-On Introduction to Kubernetes at LISA17

What's hot (20)

PPTX
Kubernetes 101
PDF
Google Kubernetes Engine (GKE) deep dive
PDF
Introduction to kubernetes
PDF
Introduction to Kubernetes Workshop
PDF
Kubernetes Architecture | Understanding Kubernetes Components | Kubernetes Tu...
PDF
Introduction to Kubernetes and Google Container Engine (GKE)
PPTX
Kubernetes Security
PPTX
Kubernetes PPT.pptx
PDF
Hardening Kubernetes by Securing Pods
PPTX
Kubernetes Introduction
PPTX
Kubernetes 101 for Beginners
PPT
Container security
PDF
Open shift 4 infra deep dive
PDF
Why we chose Argo Workflow to scale DevOps at InVision
PDF
Docker Swarm 0.2.0
PDF
Kubernetes Security Best Practices - With tips for the CKS exam
PDF
Opa gatekeeper
PDF
Kubernetes Basics
PDF
Kubernetes Introduction
PDF
Loki - like prometheus, but for logs
Kubernetes 101
Google Kubernetes Engine (GKE) deep dive
Introduction to kubernetes
Introduction to Kubernetes Workshop
Kubernetes Architecture | Understanding Kubernetes Components | Kubernetes Tu...
Introduction to Kubernetes and Google Container Engine (GKE)
Kubernetes Security
Kubernetes PPT.pptx
Hardening Kubernetes by Securing Pods
Kubernetes Introduction
Kubernetes 101 for Beginners
Container security
Open shift 4 infra deep dive
Why we chose Argo Workflow to scale DevOps at InVision
Docker Swarm 0.2.0
Kubernetes Security Best Practices - With tips for the CKS exam
Opa gatekeeper
Kubernetes Basics
Kubernetes Introduction
Loki - like prometheus, but for logs
Ad

Similar to Role based access control - RBAC - Kubernetes (20)

PDF
RBAC in Kuberetes
PDF
Kasten securing access to your kubernetes applications
PPTX
Apolicy achieving least privilege access in kubernetes - https://apolicy.io/
PDF
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
PDF
Appsecco Kubernetes Hacking Masterclass Presentation Slides
PDF
Hardening Kubernetes Cluster
PDF
K8s identity management
PPTX
Kubernetes #3 security
PDF
Securing Prometheus. Lessons Learned from OpenShift.pdf
PPTX
Kubernetes secret introduction
PPTX
Custom RBAC - Can I Do That?
PDF
Attacking and Defending Kubernetes - Nithin Jois
PDF
Kubernetes Hacking for Fun & Profit - BSides Bangalore - 28th June 2024
PDF
Security considerations while deploying Containerized Applications by Neepend...
PDF
DevOpsDaysRiga 2018: Andrew Martin - Continuous Kubernetes Security
PPTX
K8s security best practices
PDF
Kubernetes Security
PDF
Kubernetes Security Best Practices for DevOps
PPTX
Securing & Monitoring Your K8s Cluster with RBAC and Prometheus”.
PPTX
Kubernetes basics information along with stateful session info
RBAC in Kuberetes
Kasten securing access to your kubernetes applications
Apolicy achieving least privilege access in kubernetes - https://apolicy.io/
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Appsecco Kubernetes Hacking Masterclass Presentation Slides
Hardening Kubernetes Cluster
K8s identity management
Kubernetes #3 security
Securing Prometheus. Lessons Learned from OpenShift.pdf
Kubernetes secret introduction
Custom RBAC - Can I Do That?
Attacking and Defending Kubernetes - Nithin Jois
Kubernetes Hacking for Fun & Profit - BSides Bangalore - 28th June 2024
Security considerations while deploying Containerized Applications by Neepend...
DevOpsDaysRiga 2018: Andrew Martin - Continuous Kubernetes Security
K8s security best practices
Kubernetes Security
Kubernetes Security Best Practices for DevOps
Securing & Monitoring Your K8s Cluster with RBAC and Prometheus”.
Kubernetes basics information along with stateful session info
Ad

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Advanced Soft Computing BINUS July 2025.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Electronic commerce courselecture one. Pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Cloud computing and distributed systems.
PDF
Machine learning based COVID-19 study performance prediction
PPTX
MYSQL Presentation for SQL database connectivity
Reach Out and Touch Someone: Haptics and Empathic Computing
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
Chapter 3 Spatial Domain Image Processing.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Review of recent advances in non-invasive hemoglobin estimation
Unlocking AI with Model Context Protocol (MCP)
20250228 LYD VKU AI Blended-Learning.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
NewMind AI Monthly Chronicles - July 2025
Dropbox Q2 2025 Financial Results & Investor Presentation
Advanced Soft Computing BINUS July 2025.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Electronic commerce courselecture one. Pdf
cuic standard and advanced reporting.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Cloud computing and distributed systems.
Machine learning based COVID-19 study performance prediction
MYSQL Presentation for SQL database connectivity

Role based access control - RBAC - Kubernetes