The value for
name that you've specified for
kind: Group as a
subject in a Kubernetes
RoleBinding or
ClusterRoleBinding object. Amazon EKS doesn't confirm that the value for
name exists in any bindings on your cluster. You can specify one or more names.Kubernetes authorizes the
principalArn of the access entry to access any cluster objects that you've specified in a Kubernetes
Role or
ClusterRole object that is also specified in a binding's
roleRef. For more information about creating Kubernetes
RoleBinding,
ClusterRoleBinding,
Role, or
ClusterRole objects, see
Using RBAC Authorization in the Kubernetes documentation.If you want Amazon EKS to authorize the
principalArn (instead of, or in addition to Kubernetes authorizing the
principalArn), you can associate one or more access policies to the access entry using
AssociateAccessPolicy. If you associate any access policies, the
principalARN has all permissions assigned in the associated access policies and all permissions in any Kubernetes
Role or
ClusterRole objects that the group names are bound to.