集群的 Kubernetes API 服务器处理运行 Pod 的请求后,会通过控制平面向 Binary Authorization 模块发送准入请求。
之后,该模块会将准入请求转发到代管式 Binary Authorization API。
在 Google Cloud上,该 API 会接收请求并将其转发到 Binary Authorization Enforcer。然后,该强制执行程序会检查请求是否符合 Binary Authorization 政策。如果符合,Binary Authorization API 将返回一个“允许”响应。否则,该 API 会返回一个“拒绝”响应。
[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-09-04。"],[[["\u003cp\u003eBinary Authorization for on-premises clusters extends Google Cloud's Binary Authorization to Google Distributed Cloud environments, enabling deploy-time enforcement.\u003c/p\u003e\n"],["\u003cp\u003eIt supports Google Distributed Cloud on bare metal (version 1.14 or later) and on VMware (version 1.4 or later).\u003c/p\u003e\n"],["\u003cp\u003eThe system operates by using the Binary Authorization Module in the cluster, which acts as a validating admission webhook, to relay requests to the hosted Binary Authorization API.\u003c/p\u003e\n"],["\u003cp\u003eThe Binary Authorization enforcer checks if the deployment request meets the Binary Authorization policy, allowing or rejecting it accordingly.\u003c/p\u003e\n"],["\u003cp\u003eA webhook failure policy determines whether a container is permitted to deploy if communication with Binary Authorization fails, with the option to configure it for either fail open (allow) or fail close (deny).\u003c/p\u003e\n"]]],[],null,["# Binary Authorization for on-premises clusters overview\n\nThis document describes Binary Authorization for [on-premises clusters](/anthos/clusters/doc)\nthat are created as part of Google Distributed Cloud.\nTo get started installing and using the product, see\n[Set up Binary Authorization for on-premises clusters](/binary-authorization/docs/setting-up-on-prem).\nBinary Authorization supports the following environments:\n\n- [Google Distributed Cloud (software only) on bare metal](/anthos/clusters/docs/bare-metal/latest/overview) 1.14 or later.\n- [Google Distributed Cloud (software only) on VMware](/anthos/gke/docs/on-prem/latest/overview) 1.4 or later.\n\nBinary Authorization for on-premises clusters is a Google Cloud product that\nextends [Binary Authorization](/binary-authorization/docs/overview)'s hosted, deploy-time enforcement to\nGoogle Distributed Cloud.\n\nArchitecture\n------------\n\nBinary Authorization for on-premises clusters connects clusters\nto the Binary Authorization enforcer, running on Google Cloud.\nIt works by relaying\nrequests to run container images from on-premises clusters to the\nBinary Authorization enforcement API.\n[](/static/binary-authorization/docs/images/binauthz-for-gke-on-prem.svg) Binary Authorization for Distributed Cloud architecture with one user control plane. (Click to enlarge)\n\nBinary Authorization installs the\nBinary Authorization Module, which runs as a Kubernetes\n[validating admission webhook](https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/)\nin your cluster.\n\nWhen the Kubernetes API server for the cluster processes a request to run\na Pod, it sends an admission request, through the control plane, to the\nBinary Authorization Module.\n\nThe module then forwards the admission request to the hosted Binary Authorization\nAPI.\n\nOn Google Cloud, the API receives the request and forwards it to the\nBinary Authorization enforcer. The enforcer then checks that the request\nsatisfies the Binary Authorization policy. If it does, the Binary Authorization API\nreturns an \"allow\" response. Otherwise the API returns a \"reject\" response.\n\nOn premises, the Binary Authorization Module receives the response.\nIf the Binary Authorization Module and all of the other admission webhooks allow\nthe deploy request, the container image is allowed to deploy.\n\nFor more information about validating admission webhooks, see\n[Using Admission Controllers](https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/).\n\nWebhook failure policy\n----------------------\n\n\u003cbr /\u003e\n\nWhen a failure prevents communication with Binary Authorization, a\nwebhook-specific failure policy determines if the container is\nallowed to deploy. Configuring the failure policy to allow the container image\nto deploy is known as *fail open* . Configuring the failure policy to deny the\ncontainer image from deploying is known as *fail close*.\n| **Note:** By default, the Binary Authorization Module is configured to fail open.\n\nTo configure the Binary Authorization Module for fail close, modify the\n`manifest.yaml` file and change the `failurePolicy` from\n`Ignore` to `Fail`, then deploy the manifest file.\n\nYou can [update the failure policy](/binary-authorization/docs/setting-up-on-prem#update-failure-policy)\nin the Binary Authorization Module.\n\nWhat's next\n-----------\n\n- To learn how to set up Binary Authorization for on-premises clusters, see [Set up Binary Authorization for on-premises clusters](/binary-authorization/docs/setting-up-on-prem).\n- To learn more about Google Distributed Cloud, see the [Google Distributed Cloud overview](/distributed-cloud/docs).\n- To learn more about Binary Authorization, see [Binary Authorization overview](/binary-authorization/docs/overview)."]]