summaryrefslogtreecommitdiff
path: root/access.md
diff options
context:
space:
mode:
authorRichieEscarez <rescarez@google.com>2015-06-16 14:48:51 -0700
committerRichieEscarez <rescarez@google.com>2015-06-17 08:48:59 -0700
commit9e35c48d4abfa4b1bae2b4ed3a81047d6604985e (patch)
tree1eb0b3fc2003558004f88d3ad05cfe7c29a94b62 /access.md
parenta407b64a3d2be8e3ddca9192609c72e92b64a6a9 (diff)
Qualified all references to "controller" so that references to "replication controller" are clear. fixes #9404
Also ran hacks/run-gendocs.sh
Diffstat (limited to 'access.md')
-rw-r--r--access.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/access.md b/access.md
index 647ce552..dd64784e 100644
--- a/access.md
+++ b/access.md
@@ -193,7 +193,7 @@ K8s authorization should:
- Allow for a range of maturity levels, from single-user for those test driving the system, to integration with existing to enterprise authorization systems.
- Allow for centralized management of users and policies. In some organizations, this will mean that the definition of users and access policies needs to reside on a system other than k8s and encompass other web services (such as a storage service).
- Allow processes running in K8s Pods to take on identity, and to allow narrow scoping of permissions for those identities in order to limit damage from software faults.
-- Have Authorization Policies exposed as API objects so that a single config file can create or delete Pods, Controllers, Services, and the identities and policies for those Pods and Controllers.
+- Have Authorization Policies exposed as API objects so that a single config file can create or delete Pods, Replication Controllers, Services, and the identities and policies for those Pods and Replication Controllers.
- Be separate as much as practical from Authentication, to allow Authentication methods to change over time and space, without impacting Authorization policies.
K8s will implement a relatively simple