Whether the ABAC authorizer is enabled for this cluster. When enabled,
identities in the system, including service accounts, nodes, and
controllers, will have statically granted permissions beyond those
provided by the RBAC configuration or IAM.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eThe latest version of the Google Cloud Container V1 API is 3.33.0, but this page is showing the documentation for version 3.14.0.\u003c/p\u003e\n"],["\u003cp\u003eThis page provides documentation for the \u003ccode\u003eLegacyAbac\u003c/code\u003e class, which is part of the \u003ccode\u003eGoogle.Cloud.Container.V1\u003c/code\u003e namespace and is used for configuring legacy Attribute Based Access Control in Kubernetes clusters.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eLegacyAbac\u003c/code\u003e class implements multiple interfaces including \u003ccode\u003eIMessage\u003c/code\u003e, \u003ccode\u003eIEquatable\u003c/code\u003e, \u003ccode\u003eIDeepCloneable\u003c/code\u003e, and \u003ccode\u003eIBufferMessage\u003c/code\u003e, and is shown to inherit from the \u003ccode\u003eobject\u003c/code\u003e class.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eLegacyAbac\u003c/code\u003e class has a property named \u003ccode\u003eEnabled\u003c/code\u003e to control if the legacy ABAC authorizer is enabled on a cluster, allowing for statically granted permissions.\u003c/p\u003e\n"],["\u003cp\u003eThis page lists several versions of the API available, with documentation for versions ranging from 2.3.0 up to 3.33.0.\u003c/p\u003e\n"]]],[],null,[]]