Whether the ABAC authorizer is enabled for this cluster. When enabled,
identities in the system, including service accounts, nodes, and
controllers, will have statically granted permissions beyond those
provided by the RBAC configuration or IAM.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-03-21 UTC."],[[["This webpage provides documentation for the `LegacyAbac` class within the Google Kubernetes Engine v1 API, specifically for .NET development."],["The latest version available in the documentation is 3.33.0, with a history of versions dating back to 2.3.0, all the way to the version of 3.18.0 that the webpage focuses on."],["`LegacyAbac` configures the legacy Attribute Based Access Control (ABAC) authorization mode, used for statically granting permissions."],["The key property for `LegacyAbac` is `Enabled`, a boolean that controls whether ABAC is turned on for the cluster."],["The class `LegacyAbac` inherits from the class `object` and implements `IMessage`, `IEquatable`, `IDeepCloneable`, and `IBufferMessage` which are defined within the Google Protobuf library."]]],[]]