Name | Azure Kubernetes Fleet Manager RBAC Writer | ||||||||||||||
Id | 5af6afb3-c06c-4fa4-8848-71a8aee05683 | ||||||||||||||
Description | Grants read/write access to most Kubernetes resources within a namespace in the fleet-managed hub cluster. This role does not allow viewing or modifying roles or role bindings. However, this role allows accessing Secrets as any ServiceAccount in the namespace, so it can be used to gain the API access levels of any ServiceAccount in the namespace. Applying this role at cluster scope will give access across all namespaces. | ||||||||||||||
CreatedOn | 2022-08-22 17:29:14 UTC | ||||||||||||||
UpdatedOn | 2024-10-21 15:04:47 UTC | ||||||||||||||
History |
|
||||||||||||||
Permissions summary | Effective control plane and data plane operations: 83 (unique operations) •action: 1 •read: 61 •write: 21 Actions: 6 Resolved control plane operations from Actions: 32 Effective control plane operations: 32 •action: 1 •read: 31 NotActions: 0 Resolved control plane operations from NotActions: 0 Effective denied control plane operations: 16140 DataActions: 51 Resolved data plane operations: 51 Effective data plane operations: 51 •read: 30 •write: 21 NotDataActions: 0 Resolved data plane operations from NotDataActions: 0 Effective denied data plane operations: 3252 |
||||||||||||||
Actions |
|
||||||||||||||
NotActions | n/a | ||||||||||||||
DataActions | |||||||||||||||
NotDataActions | n/a | ||||||||||||||
Used in BuiltIn Policy |
none | ||||||||||||||
JSON |
|
||||||||||||||
Condition | none |