You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Tokens obtained from the TokenRequest API are more secure than ones stored in Secret objects, because they have a bounded lifetime and are not readable by other API clients. You can use the kubectl create token command to obtain a token from the TokenRequest API.
You should only create a service account token Secret object if you can't use the TokenRequest API to obtain a token, and the security exposure of persisting a non-expiring token credential in a readable API object is acceptable to you.
We should investigate if and how that API can be used from our controller code.
┆Issue is synchronized with this Jira Story by Unito
┆Issue Number: K8OP-213
The text was updated successfully, but these errors were encountered:
sync-by-unitobot
changed the title
Switch to TokenRequest API for ServiceAccount tokens
K8SSAND-1803 ⁃ Switch to TokenRequest API for ServiceAccount tokens
Sep 23, 2022
sync-by-unitobot
changed the title
K8SSAND-1803 ⁃ Switch to TokenRequest API for ServiceAccount tokens
Switch to TokenRequest API for ServiceAccount tokens
Oct 11, 2024
Currently we use a non-expiring token (at first auto-generated, and then explicitly declared when we moved to k8s 1.24 in #681).
The documentation recommends switching to TokenRequest instead:
We should investigate if and how that API can be used from our controller code.
┆Issue is synchronized with this Jira Story by Unito
┆Issue Number: K8OP-213
The text was updated successfully, but these errors were encountered: