Kubernetes authentication
All requests in Kubernetes originate from external users, service accounts, or Kubernetes components. If the origin of the request is unknown, it is treated as an anonymous request. Depending on the configuration of the components, anonymous requests can be allowed or dropped by the authentication modules. In v1.6+, anonymous access is allowed to support anonymous and unauthenticated users for the RBAC and ABAC authorization modes. It can be explicitly disabled by passing the --anonymous-auth=false
flag to the API server configuration:
$ps aux | grep api root      3701  6.1  8.7 497408 346244 ?      Ssl  21:06  0:16 kube-apiserver --advertise-address=192.168.99.111 --allow-privileged=true --anonymous-auth=false
Kubernetes uses one or more of these authentication strategies. Let's discuss them one by one.
Client certificates
Using X509 Certificate...