Accessing the Cluster as a User

In this lesson, we will impersonate John and try to get the access authenticated.

Authentication

Since John is not around, we’ll do some role-playing and impersonate him.

Configuring kubectl

John will first have to set the cluster using the address and the certificate authority we sent him.

Get hands-on with 1200+ tech skills courses.