Whether the ABAC authorizer is enabled for this cluster. When enabled,
identities in the system, including service accounts, nodes, and
controllers, will have statically granted permissions beyond those
provided by the RBAC configuration or IAM.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eThe latest version of the Google.Cloud.Container.V1 library is 3.33.0, with numerous previous versions also available, ranging from 3.32.0 down to 2.3.0.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eLegacyAbac\u003c/code\u003e class, part of the Google.Cloud.Container.V1 namespace, is designed for configuring Attribute Based Access Control authorization in clusters.\u003c/p\u003e\n"],["\u003cp\u003e\u003ccode\u003eLegacyAbac\u003c/code\u003e inherits from the \u003ccode\u003eObject\u003c/code\u003e class and implements several interfaces including \u003ccode\u003eIMessage\u003c/code\u003e, \u003ccode\u003eIEquatable\u003c/code\u003e, \u003ccode\u003eIDeepCloneable\u003c/code\u003e, and \u003ccode\u003eIBufferMessage\u003c/code\u003e.\u003c/p\u003e\n"],["\u003cp\u003eThe primary property within the \u003ccode\u003eLegacyAbac\u003c/code\u003e class is \u003ccode\u003eEnabled\u003c/code\u003e, which is a boolean used to determine if the ABAC authorizer is active for the cluster.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eLegacyAbac\u003c/code\u003e class has two constructors, one default constructor that takes no parameters and one that takes another \u003ccode\u003eLegacyAbac\u003c/code\u003e instance.\u003c/p\u003e\n"]]],[],null,[]]