Whether the ABAC authorizer is enabled for this cluster. When enabled,
identities in the system, including service accounts, nodes, and
controllers, will have statically granted permissions beyond those
provided by the RBAC configuration or IAM.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eThe latest version available for the \u003ccode\u003eGoogle.Cloud.Container.V1.LegacyAbac\u003c/code\u003e class is 3.33.0, with multiple previous versions ranging from 3.32.0 down to 2.3.0 also accessible.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eLegacyAbac\u003c/code\u003e class, part of the Google Kubernetes Engine v1 API, configures the legacy Attribute Based Access Control authorization mode.\u003c/p\u003e\n"],["\u003cp\u003eThis class implements \u003ccode\u003eIMessage<LegacyAbac>\u003c/code\u003e, \u003ccode\u003eIEquatable<LegacyAbac>\u003c/code\u003e, \u003ccode\u003eIDeepCloneable<LegacyAbac>\u003c/code\u003e, \u003ccode\u003eIBufferMessage\u003c/code\u003e, and \u003ccode\u003eIMessage\u003c/code\u003e interfaces.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eLegacyAbac\u003c/code\u003e class has a boolean property named \u003ccode\u003eEnabled\u003c/code\u003e, which determines whether the ABAC authorizer is active for a given cluster.\u003c/p\u003e\n"],["\u003cp\u003eThere are two constructors available for the \u003ccode\u003eLegacyAbac\u003c/code\u003e class: a default constructor and one that takes another \u003ccode\u003eLegacyAbac\u003c/code\u003e object as a parameter.\u003c/p\u003e\n"]]],[],null,[]]