Name | Azure Kubernetes Fleet Manager RBAC Reader | ||||||||||||||
Id | 30b27cfc-9c84-438e-b0ce-70e35255df80 | ||||||||||||||
Description | Grants read-only access to most Kubernetes resources within a namespace in the fleet-managed hub cluster. It does not allow viewing roles or role bindings. This role does not allow viewing Secrets, since reading the contents of Secrets enables access to ServiceAccount credentials in the namespace, which would allow API access as any ServiceAccount in the namespace (a form of privilege escalation). Applying this role at cluster scope will give access across all namespaces. | ||||||||||||||
CreatedOn | 2022-08-22 17:29:14 UTC | ||||||||||||||
UpdatedOn | 2024-10-23 18:34:36 UTC | ||||||||||||||
History |
|
||||||||||||||
Permissions summary | Effective control plane and data plane operations: 61 (unique operations) •action: 1 •read: 60 Actions: 6 Resolved control plane operations from Actions: 32 Effective control plane operations: 32 •action: 1 •read: 31 NotActions: 0 Resolved control plane operations from NotActions: 0 Effective denied control plane operations: 16140 DataActions: 30 Resolved data plane operations: 29 Effective data plane operations: 29 •read: 29 NotDataActions: 0 Resolved data plane operations from NotDataActions: 0 Effective denied data plane operations: 3274 |
||||||||||||||
Actions |
|
||||||||||||||
NotActions | n/a | ||||||||||||||
DataActions | |||||||||||||||
NotDataActions | n/a | ||||||||||||||
Used in BuiltIn Policy |
none | ||||||||||||||
JSON |
|
||||||||||||||
Condition | none |