Skip to content

Commit aef6f4e

Browse files
committed
add link
1 parent 1b0012b commit aef6f4e

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

containers/kubernetes/how-to/manage-kubeconfig-with-iam.mdx

+2-2
Original file line numberDiff line numberDiff line change
@@ -26,13 +26,13 @@ Scaleway's Identity and Access Management (IAM) is now being used to generate Ku
2626
- Audit logs facilitate the identification of specific Kubernetes users.
2727
- **Enhanced Application Security:**
2828
- Applications within the cluster are authenticated using specific tokens.
29-
- This authentication method is particularly useful when a pod needs to interact with the Kubernetes API, as it can authenticate using its associated Service Account.
29+
- This authentication method is particularly useful when a pod needs to interact with the Kubernetes API, as it can authenticate using its associated [Service Account](https://kubernetes.io/docs/concepts/security/service-accounts/).
3030

3131
[Identity and Access Management (IAM)](https://www.scaleway.com/en/docs/identity-and-access-management/iam/concepts/#iam) provides control over resource access. IAM policies enable the configuration of permissions for Kubernetes Kapsule clusters at the Project level.
3232

3333
An [IAM policy](https://www.scaleway.com/en/docs/identity-and-access-management/iam/concepts/#policy) defines the permissions for users, groups, and applications within an Organization. It consists of a [principal](https://www.scaleway.com/en/docs/identity-and-access-management/iam/concepts/#principal) (the user, group, or application to which it applies) and IAM rules that specify permission sets and their scope.
3434

35-
The [combination of IAM and Kubernetes RBAC](/containers/kubernetes/reference-content/set-iam-permissions-and-implement-rbac/) allows defining fine-grained access levels for cluster users.
35+
The [combination of IAM and Kubernetes RBAC (Role-based Acccess Control)](/containers/kubernetes/reference-content/set-iam-permissions-and-implement-rbac/) allows defining fine-grained access levels for cluster users.
3636

3737
<Message type="important">
3838
Entering a deprecation cycle, the former authentication system (using static admin tokens) remains active until the second half of 2024: all your legacy Kubeconfig files keep access to their clusters for the time being. For security purposes, you can still use the ["reset admin token" feature](/containers/kubernetes/how-to/revoke-kubeconfig/), either through our Kubernetes API or Scaleway’s CLI.

0 commit comments

Comments
 (0)