Questo contenuto non è disponibile nella lingua selezionata.
Chapter 17. Impersonating the system:admin user
17.1. API impersonation Copia collegamentoCollegamento copiato negli appunti!
You can configure a request to the OpenShift Container Platform API to act as though it originated from another user. For more information, see User impersonation in the Kubernetes documentation.
17.2. Impersonating the system:admin user Copia collegamentoCollegamento copiato negli appunti!
You can grant a user permission to impersonate
system:admin
Procedure
To grant a user permission to impersonate
, run the following command:system:admin$ oc create clusterrolebinding <any_valid_name> --clusterrole=sudoer --user=<username>TipYou can alternatively apply the following YAML to grant permission to impersonate
:system:adminapiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: <any_valid_name> roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: sudoer subjects: - apiGroup: rbac.authorization.k8s.io kind: User name: <username>
17.3. Impersonating the system:admin group Copia collegamentoCollegamento copiato negli appunti!
When a
system:admin
--as=<user> --as-group=<group1> --as-group=<group2>
Procedure
To grant a user permission to impersonate a
by impersonating the associated cluster administration groups, run the following command:system:admin$ oc create clusterrolebinding <any_valid_name> --clusterrole=sudoer --as=<user> \ --as-group=<group1> --as-group=<group2>