Skip to content

Commit 17f3f21

Browse files
Merge pull request #259351 from MGoedtel/task185545
AKS Orphaned Entra ID Article
2 parents 65eaa2f + 30337c1 commit 17f3f21

File tree

2 files changed

+13
-11
lines changed

2 files changed

+13
-11
lines changed

articles/aks/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -422,7 +422,7 @@
422422
- name: AKS-managed Microsoft Entra ID
423423
items:
424424
- name: Enable AKS-managed Microsoft Entra integration
425-
href: managed-azure-ad.md
425+
href: enable-authentication-microsoft-entra-id.md
426426
- name: Manage local accounts
427427
href: manage-local-accounts-managed-azure-ad.md
428428
- name: Cluster access control

articles/aks/enable-authentication-microsoft-entra-id.md

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,30 +1,32 @@
11
---
2-
title: Enable Managed Identity Authentication
3-
description: Learn how to enable Microsoft Entra ID on AKS with kubelogin. Connect your clusters to authenticate Azure users with credentials or managed roles.
2+
title: Enable managed identity authentication on Azure Kubernetes Service
3+
description: Learn how to enable Microsoft Entra ID on Azure Kubernetes Service with kubelogin and authenticate Azure users with credentials or managed roles.
44
ms.topic: article
5-
ms.date: 11/13/2023
5+
ms.date: 11/22/2023
66
ms.custom: devx-track-azurecli
77
ms.author: miwithro
88
---
99

10-
# Enable Azure Managed Identity authentication for Kubernetes clusters with kubelogin
10+
# Enable Azure managed identity authentication for Kubernetes clusters with kubelogin
1111

1212
The AKS-managed Microsoft Entra integration simplifies the Microsoft Entra integration process. Previously, you were required to create a client and server app, and the Microsoft Entra tenant had to grant Directory Read permissions. Now, the AKS resource provider manages the client and server apps for you.
1313

1414
Cluster administrators can configure Kubernetes role-based access control (Kubernetes RBAC) based on a user's identity or directory group membership. Microsoft Entra authentication is provided to AKS clusters with OpenID Connect. OpenID Connect is an identity layer built on top of the OAuth 2.0 protocol. For more information on OpenID Connect, see the [OpenID Connect documentation][open-id-connect].
1515

1616
Learn more about the Microsoft Entra integration flow in the [Microsoft Entra documentation](concepts-identity.md#azure-ad-integration).
1717

18-
## Limitations of integration
18+
## Limitations
1919

20-
Azure Managed ID on AKS has certain limits to account for before you make a decision.
21-
* The integration can't be disabled once added.
20+
The following are constraints integrating Azure managed identity authentication on AKS.
21+
22+
* Integration can't be disabled once added.
2223
* Downgrades from an integrated cluster to the legacy Microsoft Entra ID clusters aren't supported.
2324
* Clusters without Kubernetes RBAC support are unable to add the integration.
2425

2526
## Before you begin
2627

27-
There are a few requirements to properly install the aks addon for managed identity.
28+
The following requirements need to be met in order to properly install the AKS addon for managed identity.
29+
2830
* You have Azure CLI version 2.29.0 or later installed and configured. Run `az --version` to find the version. If you need to install or upgrade, see [Install Azure CLI](/cli/azure/install-azure-cli).
2931
* You need `kubectl` with a minimum version of [1.18.1](https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG/CHANGELOG-1.18.md#v1181) or [`kubelogin`][kubelogin]. With the Azure CLI and the Azure PowerShell module, these two commands are included and automatically managed. Meaning, they're upgraded by default and running `az aks install-cli` isn't required or recommended. If you're using an automated pipeline, you need to manage upgrades for the correct or latest version. The difference between the minor versions of Kubernetes and `kubectl` shouldn't be more than *one* version. Otherwise, authentication issues occur on the wrong version.
3032
* If you're using [helm](https://github.com/helm/helm), you need a minimum version of helm 3.3.
@@ -174,9 +176,9 @@ There are some non-interactive scenarios that don't support `kubectl`. In these
174176
## Troubleshoot access issues
175177
176178
> [!IMPORTANT]
177-
> The steps described in this section bypass the normal Microsoft Entra group authentication. Use them only in an emergency.
179+
> The step described in this section suggests an alternative authentication method compared to the normal Microsoft Entra group authentication. Use this option only in an emergency.
178180
179-
If you lack admin access to a valid Microsoft Entra group, you can follow this workaround. Sign in through the [Azure Kubernetes Service Cluster Admin](../role-based-access-control/built-in-roles.md#azure-kubernetes-service-cluster-admin-role) role and grant your group or tenant admin credentials to access your cluster.
181+
If you lack administrative access to a valid Microsoft Entra group, you can follow this workaround. Sign in with an account that is a member of the [Azure Kubernetes Service Cluster Admin](../role-based-access-control/built-in-roles.md#azure-kubernetes-service-cluster-admin-role) role and grant your group or tenant admin credentials to access your cluster.
180182
181183
## Next steps
182184

0 commit comments

Comments
 (0)