Skip to content

Commit 227e2fe

Browse files
committed
doc fix for SA authN cluster connect
1 parent 303f188 commit 227e2fe

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

articles/azure-arc/kubernetes/azure-rbac.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ A conceptual overview of this feature is available in the [Azure RBAC on Azure A
5757
az ad app update --id "${SERVER_APP_ID}" --set groupMembershipClaims=All
5858
```
5959
60-
1. Create a service principal and get its `password` field value. This value is required later as `serverApplicationSecret` when you're enabling this feature on the cluster. Please note that this secret is valid for 1 year and will need to be [rotated after that](azure-rbac.md#refresh-the-secret-of-the-server-application).
60+
1. Create a service principal and get its `password` field value. This value is required later as `serverApplicationSecret` when you're enabling this feature on the cluster. Please note that this secret is valid for 1 year and will need to be [rotated after that](./azure-rbac.md#refresh-the-secret-of-the-server-application).
6161
6262
```azurecli
6363
az ad sp create --id "${SERVER_APP_ID}"

articles/azure-arc/kubernetes/cluster-connect.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -158,7 +158,7 @@ A conceptual overview of this feature is available in [Cluster connect - Azure A
158158
kubectl create serviceaccount demo-user
159159
```
160160

161-
1. Create ClusterRoleBinding or RoleBinding to grant this [service account the appropriate permissions on the cluster](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#kubectl-create-rolebinding). Example:
161+
1. Create ClusterRoleBinding to grant this [service account the appropriate permissions on the cluster](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#kubectl-create-rolebinding). Example:
162162

163163
```console
164164
kubectl create clusterrolebinding demo-user-binding --clusterrole cluster-admin --serviceaccount default:demo-user

0 commit comments

Comments
 (0)