Skip to content
ATO Pathways
Log In
Overview
Search
Catalogs
SCAP
OSCAL
Catalogs
Profiles
Documents
References
Knowledge Base
Platform Documentation
Compliance Dictionary
Platform Changelog
About
Catalogs
XCCDF
Guide to the Secure Configuration of Amazon Elastic Kubernetes Service
Kubernetes Settings
Authentication
Authentication
An XCCDF Group - A logical subset of the XCCDF Benchmark
Details
Profiles
Prose
Authentication
1 Rule
In cloud workloads, there are many ways to create and configure to multiple authentication services. Some of these authentication methods by not be secure or common methodologies, or they may not be secure by default. This section introduces mechanisms for configuring authentication systems Kubernetes.
OAuth Clients Token Inactivity Timeout
Enter OAuth Clients Token Inactivity Timeout in Seconds
OAuth Token Inactivity Timeout
Enter OAuth Token Inactivity Timeout
Manage Users with AWS IAM
Unknown Severity
Amazon EKS uses IAM to provide authentication to your Kubernetes cluster through the AWS IAM Authenticator for Kubernetes. You can configure the stock kubectl client to work with Amazon EKS by installing the AWS IAM Authenticator for Kubernetes and modifying your kubectl configuration file to use it for authentication.