You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* link:https://docs.openshift.com/container-platform/4.17/authentication/using-rbac.html#authorization-overview_using-rbac[Using RBAC to define and apply permissions]
18
+
* xref:../../../authentication/using-rbac.adoc#authorization-overview_using-rbac[Using RBAC to define and apply permissions]
* link:https://docs.openshift.com/container-platform/4.17/authentication/understanding-and-creating-service-accounts.html[Understanding and creating service accounts]
25
+
* xref:../../../authentication/understanding-and-creating-service-accounts.adoc#understanding-and-creating-service-accounts[Understanding and creating service accounts]
Copy file name to clipboardExpand all lines: modules/security-sec-context-constraints.adoc
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -26,13 +26,13 @@ Security context constraints allow an administrator to control the following sec
26
26
27
27
Default SCCs are created during installation and when you install some Operators or other components. As a cluster administrator, you can also create your own SCCs by using the OpenShift CLI (`oc`).
28
28
29
-
For information about default security context constraints, see link:https://docs.openshift.com/container-platform/4.17/authentication/managing-security-context-constraints.html#default-sccs_configuring-internal-oauth[Default security context constraints].
29
+
For information about default security context constraints, see link:https://docs.openshift.com/container-platform/{product-version}/authentication/managing-security-context-constraints.html#default-sccs_configuring-internal-oauth[Default security context constraints].
30
30
31
31
[IMPORTANT]
32
32
====
33
33
Do not modify the default SCCs. Customizing the default SCCs can lead to issues when some of the platform pods deploy or {product-title} is upgraded. Additionally, the default SCC values are reset to the defaults during some cluster upgrades, which discards all customizations to those SCCs.
34
34
35
-
Instead of modifying the default SCCs, create and modify your own SCCs as needed. For detailed steps, see link:https://docs.openshift.com/container-platform/4.17/authentication/managing-security-context-constraints.html#security-context-constraints-creating_configuring-internal-oauth[Creating security context constraints].
35
+
Instead of modifying the default SCCs, create and modify your own SCCs as needed. For detailed steps, see link:https://docs.openshift.com/container-platform/{product-version}/authentication/managing-security-context-constraints.html#security-context-constraints-creating_configuring-internal-oauth[Creating security context constraints].
36
36
====
37
37
38
38
You can use the following basic SCCs:
@@ -96,4 +96,4 @@ The `restricted-v2` SCC explicitly denies everything except what it explicitly a
96
96
* Allowed capabilities: `NET_BIND_SERVICE`. A pod can request this capability, but it is not added by default.
97
97
* Allowed `seccomp` profiles: `runtime/default`.
98
98
99
-
For more information, see link:https://docs.openshift.com/container-platform/4.17/authentication/managing-security-context-constraints.html[Managing security context constraints].
99
+
For more information, see link:https://docs.openshift.com/container-platform/{product-version}/authentication/managing-security-context-constraints.html[Managing security context constraints].
0 commit comments