Securing and Accessing Clusters on EKS
This chapter will introduce the general concepts for authentication and authorization in Kubernetes, and will also discuss the differences between these concepts and Elastic Kubernetes Service (EKS). We will also look at how to configure EKS and client tools to securely communicate.
Authentication verifies the identity of a user or service, and authorization manages what they can do. In this chapter, we will review the mechanism used in EKS to implement authentication and authorization so you to use them to build secure clusters. Specifically, we will cover the following topics:
- Understanding key Kubernetes concepts
- Configuring EKS cluster access