When user configuration depends on environment, role, or context, Kubernetes enforces strict rules that decide who can do what. The system relies on RBAC (Role-Based Access Control) and authentication methods like certificates, tokens, or OIDC. Every kubeconfig file becomes a single source of truth for identity, permissions, and access scope.