|
1 | 1 | ---
|
2 |
| -title: Enable Managed Identity Authentication |
3 |
| -description: Learn how to enable Microsoft Entra ID on AKS with kubelogin. Connect your clusters to authenticate Azure users with credentials or managed roles. |
| 2 | +title: Enable managed identity authentication on Azure Kubernetes Service |
| 3 | +description: Learn how to enable Microsoft Entra ID on Azure Kubernetes Service with kubelogin and authenticate Azure users with credentials or managed roles. |
4 | 4 | ms.topic: article
|
5 |
| -ms.date: 11/13/2023 |
| 5 | +ms.date: 11/22/2023 |
6 | 6 | ms.custom: devx-track-azurecli
|
7 | 7 | ms.author: miwithro
|
8 | 8 | ---
|
9 | 9 |
|
10 |
| -# Enable Azure Managed Identity authentication for Kubernetes clusters with kubelogin |
| 10 | +# Enable Azure managed identity authentication for Kubernetes clusters with kubelogin |
11 | 11 |
|
12 | 12 | The AKS-managed Microsoft Entra integration simplifies the Microsoft Entra integration process. Previously, you were required to create a client and server app, and the Microsoft Entra tenant had to grant Directory Read permissions. Now, the AKS resource provider manages the client and server apps for you.
|
13 | 13 |
|
14 | 14 | Cluster administrators can configure Kubernetes role-based access control (Kubernetes RBAC) based on a user's identity or directory group membership. Microsoft Entra authentication is provided to AKS clusters with OpenID Connect. OpenID Connect is an identity layer built on top of the OAuth 2.0 protocol. For more information on OpenID Connect, see the [OpenID Connect documentation][open-id-connect].
|
15 | 15 |
|
16 | 16 | Learn more about the Microsoft Entra integration flow in the [Microsoft Entra documentation](concepts-identity.md#azure-ad-integration).
|
17 | 17 |
|
18 |
| -## Limitations of integration |
| 18 | +## Limitations |
19 | 19 |
|
20 |
| -Azure Managed ID on AKS has certain limits to account for before you make a decision. |
21 |
| -* The integration can't be disabled once added. |
| 20 | +The following are constraints integrating Azure managed identity authentication on AKS. |
| 21 | + |
| 22 | +* Integration can't be disabled once added. |
22 | 23 | * Downgrades from an integrated cluster to the legacy Microsoft Entra ID clusters aren't supported.
|
23 | 24 | * Clusters without Kubernetes RBAC support are unable to add the integration.
|
24 | 25 |
|
25 | 26 | ## Before you begin
|
26 | 27 |
|
27 |
| -There are a few requirements to properly install the aks addon for managed identity. |
| 28 | +The following requirements need to be met in order to properly install the AKS addon for managed identity. |
| 29 | + |
28 | 30 | * You have Azure CLI version 2.29.0 or later installed and configured. Run `az --version` to find the version. If you need to install or upgrade, see [Install Azure CLI](/cli/azure/install-azure-cli).
|
29 | 31 | * You need `kubectl` with a minimum version of [1.18.1](https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG/CHANGELOG-1.18.md#v1181) or [`kubelogin`][kubelogin]. With the Azure CLI and the Azure PowerShell module, these two commands are included and automatically managed. Meaning, they're upgraded by default and running `az aks install-cli` isn't required or recommended. If you're using an automated pipeline, you need to manage upgrades for the correct or latest version. The difference between the minor versions of Kubernetes and `kubectl` shouldn't be more than *one* version. Otherwise, authentication issues occur on the wrong version.
|
30 | 32 | * If you're using [helm](https://github.com/helm/helm), you need a minimum version of helm 3.3.
|
@@ -174,9 +176,9 @@ There are some non-interactive scenarios that don't support `kubectl`. In these
|
174 | 176 | ## Troubleshoot access issues
|
175 | 177 |
|
176 | 178 | > [!IMPORTANT]
|
177 |
| -> The steps described in this section bypass the normal Microsoft Entra group authentication. Use them only in an emergency. |
| 179 | +> The step described in this section suggests an alternative authentication method compared to the normal Microsoft Entra group authentication. Use this option only in an emergency. |
178 | 180 |
|
179 |
| -If you lack admin access to a valid Microsoft Entra group, you can follow this workaround. Sign in through the [Azure Kubernetes Service Cluster Admin](../role-based-access-control/built-in-roles.md#azure-kubernetes-service-cluster-admin-role) role and grant your group or tenant admin credentials to access your cluster. |
| 181 | +If you lack administrative access to a valid Microsoft Entra group, you can follow this workaround. Sign in with an account that is a member of the [Azure Kubernetes Service Cluster Admin](../role-based-access-control/built-in-roles.md#azure-kubernetes-service-cluster-admin-role) role and grant your group or tenant admin credentials to access your cluster. |
180 | 182 |
|
181 | 183 | ## Next steps
|
182 | 184 |
|
|
0 commit comments