Whether the ABAC authorizer is enabled for this cluster. When enabled,
identities in the system, including service accounts, nodes, and
controllers, will have statically granted permissions beyond those
provided by the RBAC configuration or IAM.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eThis webpage provides documentation for the \u003ccode\u003eLegacyAbac\u003c/code\u003e class within the Google Kubernetes Engine v1 API, specifically for .NET.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eLegacyAbac\u003c/code\u003e class is used to configure the legacy Attribute Based Access Control (ABAC) authorization mode in a cluster.\u003c/p\u003e\n"],["\u003cp\u003eThe documentation outlines the class's implementation of various interfaces, such as \u003ccode\u003eIMessage\u003c/code\u003e, \u003ccode\u003eIEquatable\u003c/code\u003e, \u003ccode\u003eIDeepCloneable\u003c/code\u003e, and \u003ccode\u003eIBufferMessage\u003c/code\u003e.\u003c/p\u003e\n"],["\u003cp\u003eIt includes details on the \u003ccode\u003eEnabled\u003c/code\u003e property, which determines whether the ABAC authorizer is active, and how it can grant permissions beyond RBAC or IAM configurations.\u003c/p\u003e\n"],["\u003cp\u003eMultiple versions of the documentation are available, ranging from version 2.3.0 up to the latest version, 3.33.0.\u003c/p\u003e\n"]]],[],null,[]]