Google Cloud 는 명령줄에서 Fleet 클러스터를 인증할 수 있는 몇 가지 옵션을 제공합니다. 이를 통해 개발자와 기타 클러스터 사용자는 클러스터가 Google Cloud, 다른 퍼블릭 클라우드 또는 온프레미스에 있는지 여부에 관계없이 간단하고 일관되며 안전한 방식으로 등록된 클러스터에 연결하고 명령어를 실행할 수 있습니다.
Google Cloud 의 모든 GKE 클러스터는 Google Cloud 사용자 및 서비스 계정 ID를 수락하도록 구성됩니다. Fleet에 여러 환경의 클러스터가 포함된 경우 사용자와 서비스 계정도 Google Cloud ID를 사용하여 등록된 클러스터에 인증할 수 있도록 Connect 게이트웨이를 구성할 수 있습니다.
기존 타사 ID 공급업체를 사용해서 Fleet 클러스터에 인증을 수행하려는 경우 GKE Identity Service가 인증 서비스로 사용되어 기존 ID 솔루션을 여러 Anthos 환경에 제공할 수 있습니다. Okta 및 Microsoft AD FS와 같은 모든 OpenID Connect(OIDC) 공급자와 일부 환경의 LDAP 공급자를 위한 미리보기 지원을 지원합니다. 구성된 경우 Connect 게이트웨이에 일부 타사 제공업체를 사용할 수도 있습니다.
[[["이해하기 쉬움","easyToUnderstand","thumb-up"],["문제가 해결됨","solvedMyProblem","thumb-up"],["기타","otherUp","thumb-up"]],[["이해하기 어려움","hardToUnderstand","thumb-down"],["잘못된 정보 또는 샘플 코드","incorrectInformationOrSampleCode","thumb-down"],["필요한 정보/샘플이 없음","missingTheInformationSamplesINeed","thumb-down"],["번역 문제","translationIssue","thumb-down"],["기타","otherDown","thumb-down"]],["최종 업데이트: 2025-09-01(UTC)"],[],[],null,["Google Cloud provides several options for authenticating to fleet clusters from the command line. These let developers and other cluster users connect to and run commands against registered clusters in a simple, consistent, and secured way, whether the clusters are on Google Cloud, other public clouds, or on premises.\n\nFor details of how to work with fleet clusters from the Google Cloud console, see [Logging in to a cluster from the Google Cloud console](/kubernetes-engine/fleet-management/docs/console).\n\nAuthenticate with Google Cloud\n\nAll GKE clusters on Google Cloud are configured to accept Google Cloud user and service account identities. If your fleet contains clusters in multiple environments, you can configure the [Connect gateway](/kubernetes-engine/enterprise/multicluster-management/gateway) so that users and service accounts can also authenticate to any registered cluster using their Google Cloud ID.\n\nLearn more in the following guides:\n\n- [Configuring cluster access for `kubectl`](/kubernetes-engine/docs/how-to/cluster-access-for-kubectl)\n- [Connecting to registered clusters with the Connect gateway](/kubernetes-engine/enterprise/multicluster-management/gateway)\n- [Using the Connect gateway](/kubernetes-engine/enterprise/multicluster-management/gateway/using).\n\nAuthenticate with third-party providers\n\nIf you want to use your existing third-party identity provider to authenticate to your fleet clusters, GKE Identity Service is an authentication service that lets you bring your existing identity solutions to multiple Anthos environments. It supports all [OpenID Connect (OIDC)](https://openid.net/connect/) providers such as Okta and Microsoft AD FS, as well as preview support for LDAP providers in some environments. If configured, you can also use some third-party providers with the [Connect gateway](/kubernetes-engine/enterprise/multicluster-management/gateway/setup-third-party).\n\nLearn more in the following guides:\n\n- [Introducing GKE Identity Service](/kubernetes-engine/enterprise/identity)\n- [Accessing clusters with GKE Identity Service](/kubernetes-engine/enterprise/identity/accessing)\n- [Connecting to registered clusters with the Connect gateway](/kubernetes-engine/enterprise/multicluster-management/gateway)\n- [Using the Connect gateway](/kubernetes-engine/enterprise/multicluster-management/gateway/using)"]]