Whether the ABAC authorizer is enabled for this cluster. When enabled,
identities in the system, including service accounts, nodes, and
controllers, will have statically granted permissions beyond those
provided by the RBAC configuration or IAM.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eThe latest version of the Google.Cloud.Container.V1 API is 3.33.0, with the documentation showcasing a range of versions down to 2.3.0.\u003c/p\u003e\n"],["\u003cp\u003eThis document specifically details the \u003ccode\u003eLegacyAbac\u003c/code\u003e class within the Google Kubernetes Engine v1 API, which is used for Attribute Based Access Control configuration.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eLegacyAbac\u003c/code\u003e class, found in the \u003ccode\u003eGoogle.Cloud.Container.V1\u003c/code\u003e namespace, implements interfaces such as \u003ccode\u003eIMessage\u003c/code\u003e, \u003ccode\u003eIEquatable\u003c/code\u003e, \u003ccode\u003eIDeepCloneable\u003c/code\u003e, and \u003ccode\u003eIBufferMessage\u003c/code\u003e.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eLegacyAbac\u003c/code\u003e class provides a property called \u003ccode\u003eEnabled\u003c/code\u003e which is a boolean value that dictates if the ABAC authorizer is enabled for the cluster, expanding permissions.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eLegacyAbac\u003c/code\u003e class has two constructors, one that instantiates an empty class and another that takes another instance of itself to make a copy.\u003c/p\u003e\n"]]],[],null,[]]