Whether the ABAC authorizer is enabled for this cluster. When enabled,
identities in the system, including service accounts, nodes, and
controllers, will have statically granted permissions beyond those
provided by the RBAC configuration or IAM.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eThis webpage provides documentation for the \u003ccode\u003eLegacyAbac\u003c/code\u003e class within the Google Kubernetes Engine v1 API, specifically for .NET development.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eLegacyAbac\u003c/code\u003e class manages the configuration for legacy Attribute-Based Access Control (ABAC) authorization in Kubernetes clusters.\u003c/p\u003e\n"],["\u003cp\u003eThe latest version documented is 3.33.0, and the page lists a comprehensive range of versions down to 2.3.0 for reference.\u003c/p\u003e\n"],["\u003cp\u003eThe documentation details the class's implementation, including its constructors, properties (like \u003ccode\u003eEnabled\u003c/code\u003e), inheritance from \u003ccode\u003eObject\u003c/code\u003e, and the interfaces it implements such as \u003ccode\u003eIMessage\u003c/code\u003e, \u003ccode\u003eIEquatable\u003c/code\u003e, \u003ccode\u003eIDeepCloneable\u003c/code\u003e, and \u003ccode\u003eIBufferMessage\u003c/code\u003e.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eEnabled\u003c/code\u003e property determines whether the ABAC authorizer is active for a given cluster, granting additional permissions to system identities when enabled.\u003c/p\u003e\n"]]],[],null,[]]