Skip to content

Commit 06c2f7a

Browse files
Merge pull request #249981 from Naveenommi-MSFT/patch-64
(AzureCXP) fixes MicrosoftDocs/azure-docs#114050
2 parents 0fae2b4 + ab12a47 commit 06c2f7a

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/aks/manage-azure-rbac.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ This article covers how to use Azure RBAC for Kubernetes Authorization, which al
2323
* You need managed Azure AD integration enabled on your cluster before you can add Azure RBAC for Kubernetes authorization. If you need to enable managed Azure AD integration, see [Use Azure AD in AKS](managed-azure-ad.md).
2424
* If you have CRDs and are making custom role definitions, the only way to cover CRDs today is to use `Microsoft.ContainerService/managedClusters/*/read`. For the remaining objects, you can use the specific API groups, such as `Microsoft.ContainerService/apps/deployments/read`.
2525
* New role assignments can take up to five minutes to propagate and be updated by the authorization server.
26-
* This article requires that the Azure AD tenant configured for authentication is same as the tenant for the subscription that holds your AKS cluster.
26+
* Azure RBAC for Kubernetes Authorization requires that the Azure AD tenant configured for authentication is same as the tenant for the subscription that holds your AKS cluster.
2727

2828
## Create a new AKS cluster with managed Azure AD integration and Azure RBAC for Kubernetes Authorization
2929

0 commit comments

Comments
 (0)