From 1c1b2c2ab3f29cf4a0dba121ae5b80312904b9d7 Mon Sep 17 00:00:00 2001 From: Jim Galasyn Date: Mon, 23 Apr 2018 14:57:36 -0700 Subject: [PATCH] Update note on grants and service accounts --- ee/ucp/authorization/migrate-kubernetes-roles.md | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-) diff --git a/ee/ucp/authorization/migrate-kubernetes-roles.md b/ee/ucp/authorization/migrate-kubernetes-roles.md index d3184e035f..e3f8bb6233 100644 --- a/ee/ucp/authorization/migrate-kubernetes-roles.md +++ b/ee/ucp/authorization/migrate-kubernetes-roles.md @@ -117,8 +117,4 @@ Kubernetes workloads: privileged options. These are options like `PodSpec.hostIPC`, `PodSpec.hostNetwork`, `PodSpec.hostPID`, `SecurityContext.allowPrivilegeEscalation`, `SecurityContext.capabilities`, `SecurityContext.privileged`, and - `Volume.hostPath`. -* You can't grant permissions to Kubernetes service accounts. - The `default` service account has no permissions and can't use the Kubernetes - API. All other service accounts have full admin permissions and can only be - used by Docker EE administrators. + `Volume.hostPath`. \ No newline at end of file