Whether the ABAC authorizer is enabled for this cluster. When enabled,
identities in the system, including service accounts, nodes, and
controllers, will have statically granted permissions beyond those
provided by the RBAC configuration or IAM.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-04-09 UTC."],[[["The latest version of the Google.Cloud.Container.V1 API is 3.33.0, with this page presenting versions back to 2.3.0."],["This documentation focuses on the `LegacyAbac` class within the Google Kubernetes Engine v1 API."],["`LegacyAbac` configures the legacy Attribute Based Access Control authorization mode for clusters, inheriting from object and implementing several interfaces."],["The `Enabled` property within `LegacyAbac` determines if the ABAC authorizer is active for a specific cluster, granting permissions beyond RBAC or IAM configurations."],["The `LegacyAbac` class has two constructors, the default constructor, and a second which accepts a LegacyAbac object as a parameter."]]],[]]