Skip to content

Commit 15d91fc

Browse files
authored
Merge pull request #87957 from zr-msft/aks-k8s-dash-rollback
[AKS] restored original dashboard auth behavior
2 parents a00eafe + 43e1285 commit 15d91fc

File tree

1 file changed

+13
-0
lines changed

1 file changed

+13
-0
lines changed

articles/aks/kubernetes-dashboard.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,7 @@ az aks browse --resource-group myResourceGroup --name myAKSCluster
3232

3333
This command creates a proxy between your development system and the Kubernetes API, and opens a web browser to the Kubernetes dashboard. If a web browser doesn't open to the Kubernetes dashboard, copy and paste the URL address noted in the Azure CLI, typically `http://127.0.0.1:8001`.
3434

35+
<!--
3536
![The login page of the Kubernetes web dashboard](./media/kubernetes-dashboard/dashboard-login.png)
3637
3738
You have the following options to sign in to your cluster's dashboard:
@@ -60,6 +61,18 @@ You have the following options to sign in to your cluster's dashboard:
6061
> For more information on using the different authentication methods, see the Kubernetes dashboard wiki on [access controls][dashboard-authentication].
6162
6263
After you choose a method to sign in, the Kubernetes dashboard is displayed. If you chose to use *token* or *skip*, the Kubernetes dashboard will use the permissions of the currently logged in user to access the cluster.
64+
-->
65+
66+
> [!IMPORTANT]
67+
> If your AKS cluster uses RBAC, a *ClusterRoleBinding* must be created before you can correctly access the dashboard. By default, the Kubernetes dashboard is deployed with minimal read access and displays RBAC access errors. The Kubernetes dashboard does not currently support user-provided credentials to determine the level of access, rather it uses the roles granted to the service account. A cluster administrator can choose to grant additional access to the *kubernetes-dashboard* service account, however this can be a vector for privilege escalation. You can also integrate Azure Active Directory authentication to provide a more granular level of access.
68+
>
69+
> To create a binding, use the [kubectl create clusterrolebinding][kubectl-create-clusterrolebinding] command. The following example shows how to create a sample binding, however, this sample binding does not apply any additional authentication components and may lead to insecure use. The Kubernetes dashboard is open to anyone with access to the URL. Do not expose the Kubernetes dashboard publicly.
70+
>
71+
> ```console
72+
> kubectl create clusterrolebinding kubernetes-dashboard --clusterrole=cluster-admin --serviceaccount=kube-system:kubernetes-dashboard
73+
> ```
74+
>
75+
> For more information on using the different authentication methods, see the Kubernetes dashboard wiki on [access controls][dashboard-authentication].
6376
6477
![The overview page of the Kubernetes web dashboard](./media/kubernetes-dashboard/dashboard-overview.png)
6578

0 commit comments

Comments
 (0)