-
Feature Request
-
Resolution: Done
-
Critical
-
None
-
None
-
None
-
False
-
None
-
False
-
Not Selected
-
-
RedHat allows following roles for system:anonymous user and system:unauthenticated group:
oc get clusterrolebindings -o json | jq '.items[] | select(.subjects[]?.kind
== "Group" and .subjects[]?.name == "system:unauthenticated") |
.metadata.name' | uniq
Returns what unauthenticated users can do, which is the following:
"self-access-reviewers"
"system:oauth-token-deleters"
"system:openshift:public-info-viewer"
"system:public-info-viewer"
"system:scope-impersonation"
"system:webhooks"
Customers would like to minimize the allowed permissions to unauthenticated groups and users.
Workaround available: Gating the access with policy engines
Expected: Minimize the allowed roles for unauthenticated access
- is related to
-
AUTH-509 Investigate reducing permissions for unauthenticated users for apiserver access
- Release Pending
- relates to
-
OCPSTRAT-1378 Reduced the permissions for anonymous users and groups
- Closed