This is a cache of https://docs.openshift.com/container-platform/3.11/rest_api/authorization_k8s_io/authorization-k8s-io-index.html. It is a snapshot of the page at 2024-11-26T02:19:29.992+0000.
About authorization.k8s.io - authorization.k8s.io | API reference | OpenShift Container Platform 3.11
×

LocalSubjectAccessReview [authorization.k8s.io/v1]

Description

LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking.

Type

object

SelfSubjectAccessReview [authorization.k8s.io/v1]

Description

SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means "in all namespaces". Self is a special case, because users should always be able to check whether they can perform an action

Type

object

SelfSubjectRulesReview [authorization.k8s.io/v1]

Description

SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. The returned list of actions may be incomplete depending on the server’s authorization mode, and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server.

Type

object

SubjectAccessReview [authorization.k8s.io/v1]

Description

SubjectAccessReview checks whether or not a user or group can perform an action.

Type

object