You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/enable-authentication-microsoft-entra-id.md
+7-5Lines changed: 7 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,8 +1,8 @@
1
1
---
2
2
title: Enable Managed Identity Authentication
3
-
description: Learn how to enable Microsoft Entra ID on AKS with kubelogin. Connect your clusters to authenticate Azure users with credentials or managed roles.
3
+
description: Learn how to enable Microsoft Entra ID on Azure Kubernetes Service with kubelogin and authenticateAzure users with credentials or managed roles.
4
4
ms.topic: article
5
-
ms.date: 11/13/2023
5
+
ms.date: 11/22/2023
6
6
ms.custom: devx-track-azurecli
7
7
ms.author: miwithro
8
8
---
@@ -18,13 +18,15 @@ Learn more about the Microsoft Entra integration flow in the [Microsoft Entra do
18
18
## Limitations of integration
19
19
20
20
Azure Managed ID on AKS has certain limits to account for before you make a decision.
21
+
21
22
* The integration can't be disabled once added.
22
23
* Downgrades from an integrated cluster to the legacy Microsoft Entra ID clusters aren't supported.
23
24
* Clusters without Kubernetes RBAC support are unable to add the integration.
24
25
25
26
## Before you begin
26
27
27
-
There are a few requirements to properly install the aks addon for managed identity.
28
+
The following requirements need to be met in order to properly install the AKS addon for managed identity.
29
+
28
30
* You have Azure CLI version 2.29.0 or later installed and configured. Run `az --version` to find the version. If you need to install or upgrade, see [Install Azure CLI](/cli/azure/install-azure-cli).
29
31
* You need `kubectl` with a minimum version of [1.18.1](https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG/CHANGELOG-1.18.md#v1181) or [`kubelogin`][kubelogin]. With the Azure CLI and the Azure PowerShell module, these two commands are included and automatically managed. Meaning, they're upgraded by default and running `az aks install-cli` isn't required or recommended. If you're using an automated pipeline, you need to manage upgrades for the correct or latest version. The difference between the minor versions of Kubernetes and `kubectl` shouldn't be more than *one* version. Otherwise, authentication issues occur on the wrong version.
30
32
* If you're using [helm](https://github.com/helm/helm), you need a minimum version of helm 3.3.
@@ -174,9 +176,9 @@ There are some non-interactive scenarios that don't support `kubectl`. In these
174
176
## Troubleshoot access issues
175
177
176
178
> [!IMPORTANT]
177
-
> The steps described in this section bypass the normal Microsoft Entra group authentication. Use them only in an emergency.
179
+
> The step described in this section suggests an alternative authentication method compared to the normal Microsoft Entra group authentication. Use this option only in an emergency.
178
180
179
-
If you lack admin access to a valid Microsoft Entra group, you can follow this workaround. Sign in through the [Azure Kubernetes Service Cluster Admin](../role-based-access-control/built-in-roles.md#azure-kubernetes-service-cluster-admin-role) role and grant your group or tenant admin credentials to access your cluster.
181
+
If you lack administrative access to a valid Microsoft Entra group, you can follow this workaround. Sign in with an account that is a member of the [Azure Kubernetes Service Cluster Admin](../role-based-access-control/built-in-roles.md#azure-kubernetes-service-cluster-admin-role) role and grant your group or tenant admin credentials to access your cluster.
0 commit comments