Whether the ABAC authorizer is enabled for this cluster. When enabled,
identities in the system, including service accounts, nodes, and
controllers, will have statically granted permissions beyond those
provided by the RBAC configuration or IAM.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eThe latest version of the Google.Cloud.Container.V1 API is 3.33.0, with documentation available for multiple versions ranging from 3.33.0 down to 2.3.0.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eLegacyAbac\u003c/code\u003e class, documented within the Google Kubernetes Engine v1 API, configures the legacy Attribute Based Access Control authorization mode.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eLegacyAbac\u003c/code\u003e class inherits from \u003ccode\u003eobject\u003c/code\u003e and implements interfaces such as \u003ccode\u003eIMessage\u003c/code\u003e, \u003ccode\u003eIEquatable\u003c/code\u003e, \u003ccode\u003eIDeepCloneable\u003c/code\u003e, and \u003ccode\u003eIBufferMessage\u003c/code\u003e.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eEnabled\u003c/code\u003e property of the \u003ccode\u003eLegacyAbac\u003c/code\u003e class determines if the ABAC authorizer is active, granting identities permissions beyond RBAC or IAM when enabled.\u003c/p\u003e\n"],["\u003cp\u003eThe primary version that this page is referencing and detailing is \u003ccode\u003e3.15.0\u003c/code\u003e.\u003c/p\u003e\n"]]],[],null,[]]