Reference documentation and code samples for the Google Cloud Container V1 Client class LegacyAbac.
Configuration for the legacy Attribute Based Access Control authorization
mode.
Generated from protobuf message google.container.v1.LegacyAbac
Namespace
Google \ Cloud \ Container \ V1
Methods
__construct
Constructor.
Parameters
Name
Description
data
array
Optional. Data for populating the Message object.
↳ enabled
bool
Whether the ABAC authorizer is enabled for this cluster. When enabled, identities in the system, including service accounts, nodes, and controllers, will have statically granted permissions beyond those provided by the RBAC configuration or IAM.
getEnabled
Whether the ABAC authorizer is enabled for this cluster. When enabled,
identities in the system, including service accounts, nodes, and
controllers, will have statically granted permissions beyond those
provided by the RBAC configuration or IAM.
Returns
Type
Description
bool
setEnabled
Whether the ABAC authorizer is enabled for this cluster. When enabled,
identities in the system, including service accounts, nodes, and
controllers, will have statically granted permissions beyond those
provided by the RBAC configuration or IAM.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-28 UTC."],[],[],null,["# Google Cloud Container V1 Client - Class LegacyAbac (2.5.0)\n\nVersion latestkeyboard_arrow_down\n\n- [2.5.0 (latest)](/php/docs/reference/cloud-container/latest/V1.LegacyAbac)\n- [2.4.0](/php/docs/reference/cloud-container/2.4.0/V1.LegacyAbac)\n- [2.3.4](/php/docs/reference/cloud-container/2.3.4/V1.LegacyAbac)\n- [2.2.1](/php/docs/reference/cloud-container/2.2.1/V1.LegacyAbac)\n- [2.1.0](/php/docs/reference/cloud-container/2.1.0/V1.LegacyAbac)\n- [2.0.0](/php/docs/reference/cloud-container/2.0.0/V1.LegacyAbac)\n- [1.33.0](/php/docs/reference/cloud-container/1.33.0/V1.LegacyAbac)\n- [1.32.0](/php/docs/reference/cloud-container/1.32.0/V1.LegacyAbac)\n- [1.31.0](/php/docs/reference/cloud-container/1.31.0/V1.LegacyAbac)\n- [1.30.3](/php/docs/reference/cloud-container/1.30.3/V1.LegacyAbac)\n- [1.24.0](/php/docs/reference/cloud-container/1.24.0/V1.LegacyAbac)\n- [1.23.0](/php/docs/reference/cloud-container/1.23.0/V1.LegacyAbac)\n- [1.22.0](/php/docs/reference/cloud-container/1.22.0/V1.LegacyAbac)\n- [1.21.1](/php/docs/reference/cloud-container/1.21.1/V1.LegacyAbac)\n- [1.20.0](/php/docs/reference/cloud-container/1.20.0/V1.LegacyAbac)\n- [1.19.0](/php/docs/reference/cloud-container/1.19.0/V1.LegacyAbac)\n- [1.18.0](/php/docs/reference/cloud-container/1.18.0/V1.LegacyAbac)\n- [1.17.1](/php/docs/reference/cloud-container/1.17.1/V1.LegacyAbac)\n- [1.16.0](/php/docs/reference/cloud-container/1.16.0/V1.LegacyAbac)\n- [1.15.0](/php/docs/reference/cloud-container/1.15.0/V1.LegacyAbac)\n- [1.14.0](/php/docs/reference/cloud-container/1.14.0/V1.LegacyAbac)\n- [1.13.1](/php/docs/reference/cloud-container/1.13.1/V1.LegacyAbac)\n- [1.12.1](/php/docs/reference/cloud-container/1.12.1/V1.LegacyAbac)\n- [1.10.3](/php/docs/reference/cloud-container/1.10.3/V1.LegacyAbac)\n- [1.9.1](/php/docs/reference/cloud-container/1.9.1/V1.LegacyAbac) \nReference documentation and code samples for the Google Cloud Container V1 Client class LegacyAbac.\n\nConfiguration for the legacy Attribute Based Access Control authorization\nmode.\n\nGenerated from protobuf message `google.container.v1.LegacyAbac`\n\nNamespace\n---------\n\nGoogle \\\\ Cloud \\\\ Container \\\\ V1\n\nMethods\n-------\n\n### __construct\n\nConstructor.\n\n### getEnabled\n\nWhether the ABAC authorizer is enabled for this cluster. When enabled,\nidentities in the system, including service accounts, nodes, and\ncontrollers, will have statically granted permissions beyond those\nprovided by the RBAC configuration or IAM.\n\n### setEnabled\n\nWhether the ABAC authorizer is enabled for this cluster. When enabled,\nidentities in the system, including service accounts, nodes, and\ncontrollers, will have statically granted permissions beyond those\nprovided by the RBAC configuration or IAM."]]