Whether the ABAC authorizer is enabled for this cluster. When enabled,
identities in the system, including service accounts, nodes, and
controllers, will have statically granted permissions beyond those
provided by the RBAC configuration or IAM.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eThe page provides documentation for the \u003ccode\u003eLegacyAbac\u003c/code\u003e class within the Google Kubernetes Engine v1 API, covering versions from 2.3.0 up to the latest, 3.33.0.\u003c/p\u003e\n"],["\u003cp\u003e\u003ccode\u003eLegacyAbac\u003c/code\u003e is a class used for configuring legacy Attribute Based Access Control (ABAC) authorization in Kubernetes clusters.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eLegacyAbac\u003c/code\u003e class inherits from \u003ccode\u003eobject\u003c/code\u003e and implements \u003ccode\u003eIMessage\u003c/code\u003e, \u003ccode\u003eIEquatable<LegacyAbac>\u003c/code\u003e, \u003ccode\u003eIDeepCloneable<LegacyAbac>\u003c/code\u003e, and \u003ccode\u003eIBufferMessage\u003c/code\u003e interfaces.\u003c/p\u003e\n"],["\u003cp\u003eThe class has a property called \u003ccode\u003eEnabled\u003c/code\u003e, a boolean that dictates whether the ABAC authorizer is active, granting permissions beyond those set by RBAC or IAM.\u003c/p\u003e\n"],["\u003cp\u003eThere are two constructors, one that is empty and the other taking a \u003ccode\u003eLegacyAbac\u003c/code\u003e parameter called \u003ccode\u003eother\u003c/code\u003e for creating a new instance.\u003c/p\u003e\n"]]],[],null,[]]