You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/intro-aks-automatic.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,14 +54,14 @@ Node management is automatically handled without the need for manual node pool c
54
54
55
55
### Security and policies
56
56
57
-
Cluster authentication and authorization use [Azure Role-based Access Control (RBAC) for Kubernetes authorization][azure-rbac-for-k8s-auth] and applications can use features like [workload identity with Microsoft Entra Workload ID][workload-identity] and [OpenID Connect (OIDC) cluster issuer][oidc-issuer] to have secure communication with Azure services. [Deployment safeguards][deployment-safeguards] enforce Kubernetes best practices through Azure Policy controls and the built-in [image cleaner][image-cleaner] removes stale and vulnerable images, enhancing image security.
57
+
Cluster authentication and authorization use [Azure Role-based Access Control (RBAC) for Kubernetes authorization][azure-rbac-for-k8s-auth] and applications can use features like [workload identity with Microsoft Entra Workload ID][workload-identity] and [OpenID Connect (OIDC) cluster issuer][oidc-issuer] to have secure communication with Azure services. [Deployment safeguards][deployment-safeguards] enforce Kubernetes best practices through Azure Policy controls and the built-in [image cleaner][image-cleaner] removes unused images with vulnerabilities, enhancing image security.
58
58
59
59
| Option | AKS Automatic | AKS Standard |
60
60
|--- |--- |--- |
61
61
| Cluster authentication and authorization |**Pre-configured:**[Azure RBAC for Kubernetes authorization][azure-rbac-for-k8s-auth] for managing cluster authentication and authorization using Azure role-based access control. |**Default:** Local accounts. <br/> **Optional:** <ul><li>[Azure RBAC for Kubernetes authorization][azure-rbac-for-k8s-auth]</li><li>[Kubernetes RBAC with Microsoft Entra integration][k8s-rbac-with-entra]</li></ul> |
62
62
| Cluster security |**Pre-configured:**[API server virtual network integration][api-server-vnet-integration] enables network communication between the API server and the cluster nodes over a private network without requiring a private link or tunnel. |**Optional:**[API server virtual network integration][api-server-vnet-integration] enables network communication between the API server and the cluster nodes over a private network without requiring a private link or tunnel.|
63
63
| Application security |**Pre-configured:** <ul><li>[Workload identity with Microsoft Entra Workload ID][workload-identity]</li><li>[OpenID Connect (OIDC) cluster issuer][oidc-issuer]</li></ul> |**Optional:** <ul><li>[Workload identity with Microsoft Entra Workload ID][workload-identity]</li><li>[OpenID Connect (OIDC) cluster issuer][oidc-issuer]</li></ul> |
64
-
| Image security |**Pre-configured:**[Image cleaner][image-cleaner] to remove stale and vulnerable images. |**Optional:**[Image cleaner][image-cleaner] to remove stale and vulnerable images. |
64
+
| Image security |**Pre-configured:**[Image cleaner][image-cleaner] to remove unused images with vulnerabilities. |**Optional:**[Image cleaner][image-cleaner] to remove unused images with vulnerabilities. |
65
65
| Policy enforcement |**Pre-configured:**[Deployment safeguards][deployment-safeguards] that enforce Kubernetes best practices in your AKS cluster through Azure Policy controls. |**Optional:**[Deployment safeguards][deployment-safeguards] enforce Kubernetes best practices in your AKS cluster through Azure Policy controls. |
66
66
67
67
### Networking
@@ -72,7 +72,7 @@ AKS Automatic clusters use [managed Virtual Network powered by Azure CNI Overlay
72
72
|--- |--- |--- |
73
73
| Virtual network |**Pre-configured:**[Managed Virtual Network using Azure CNI Overlay powered by Cilium][azure-cni-powered-by-cilium] combines the robust control plane of Azure CNI with the data plane of Cilium to provide high-performance networking and security. |**Default:**[Managed Virtual Network with kubenet][kubenet] <br/> **Optional:** <ul><li>[Azure CNI][azure-cni]</li><li>[Azure CNI Overlay][azure-cni-overlay]</li><li>[Azure CNI Overlay powered by Cilium][azure-cni-powered-by-cilium]</li><li>[Bring your own CNI][use-byo-cni]</li></ul> |
74
74
| Ingress |**Pre-configured:**[Managed NGINX using the application routing add-on][app-routing] with integrations for Azure DNS and Azure Key Vault. <br/> **Optional:** <ul><li>[Azure Service Mesh (Istio)][istio-deploy-ingress] ingress gateway</li><li>Bring your own ingress or gateway.</li></ul> |**Optional:** <ul><li>[Managed NGINX using the application routing add-on][app-routing] with integrations for Azure DNS and Azure Key Vault.</li><li>[Azure Service Mesh (Istio)][istio-deploy-ingress] ingress gateway</li><li>Bring your own ingress or gateway.</li></ul> |
75
-
| Egress |**Pre-configured:**[AKS managed NAT gateway][managed-nat-gateway] for a scalable outbound connection flows|**Default:**<ul><li>[Azure Load Balancer][egress-load-balancer]</li><li>[User-assigned NAT gateway][managed-nat-gateway]</li><li>[AKS managed NAT gateway][userassigned-nat-gateway]</li></ul> |
| Service mesh |**Optional:** <ul><li>[Azure Service Mesh (Istio)][istio-mesh]</li><li>Bring your own service mesh.</li></ul> |**Optional:** <ul><li>[Azure Service Mesh (Istio)][istio-mesh]</li><li>Bring your own service mesh.</li></ul> |
77
77
78
78
## Next steps
@@ -120,4 +120,4 @@ To learn more about AKS Automatic, follow the quickstart to create a cluster.
Copy file name to clipboardExpand all lines: articles/governance/management-groups/overview.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ above subscriptions. You organize subscriptions into management groups; the gove
14
14
cascade by inheritance to all associated subscriptions.
15
15
16
16
Management groups give you enterprise-grade management at scale, no matter what type of subscriptions you might have.
17
-
However, all subscriptions within a single management group must trust the same Azure Active Directory (Azure AD) tenant.
17
+
However, all subscriptions within a single management group must trust the same Entra ID tenant.
18
18
19
19
For example, you can apply policies to a management group that limits the regions available for virtual machine (VM) creation. This policy would be applied to all nested management groups, subscriptions, and resources and allow VM creation only in authorized regions.
20
20
@@ -56,15 +56,15 @@ subscriptions.
56
56
Each directory is given a single top-level management group called the **root** management group. The
57
57
root management group is built into the hierarchy to have all management groups and subscriptions
58
58
fold up to it. This root management group allows for global policies and Azure role assignments to
59
-
be applied at the directory level. The [Azure AD Global Administrator needs to elevate
59
+
be applied at the directory level. The [Entra ID Global Administrator needs to elevate
60
60
themselves](../../role-based-access-control/elevate-access-global-admin.md) to the User Access
61
61
Administrator role of this root group initially. After elevating access, the administrator can
62
62
assign any Azure role to other directory users or groups to manage the hierarchy. As an administrator,
63
63
you can assign your account as the owner of the root management group.
64
64
65
65
### Important facts about the root management group
66
66
67
-
- By default, the root management group's display name is **Tenant root group** and operates itself as a management group. The ID is the same value as the Azure Active Directory (Azure AD) tenant ID.
67
+
- By default, the root management group's display name is **Tenant root group** and operates itself as a management group. The ID is the same value as the Entra ID tenant ID.
68
68
- To change the display name, your account must be assigned the **Owner** or **Contributor** role on the
69
69
root management group. See
70
70
[Change the name of a management group](manage.md#change-the-name-of-a-management-group) to update
@@ -78,7 +78,7 @@ you can assign your account as the owner of the root management group.
78
78
that root management group.
79
79
- Everyone who has access to a subscription can see the context of where that subscription is in
80
80
the hierarchy.
81
-
- No one is given default access to the root management group. Azure AD Global Administrators are
81
+
- No one is given default access to the root management group. Entra ID Global Administrators are
82
82
the only users that can elevate themselves to gain access. Once they have access to the root
83
83
management group, the global administrators can assign any Azure role to other users to manage
84
84
it.
@@ -98,7 +98,7 @@ The reason for this process is to make sure there's only one management group hi
98
98
directory. The single hierarchy within the directory allows administrative customers to apply global
99
99
access and policies that other customers within the directory can't bypass. Anything assigned on the
100
100
root will apply to the entire hierarchy, which includes all management groups, subscriptions,
101
-
resource groups, and resources within that Azure AD tenant.
101
+
resource groups, and resources within that Entra ID tenant.
0 commit comments