Skip to content

Commit 230aff1

Browse files
committed
AKS Orphaned Entra ID Article
1 parent 972d8c4 commit 230aff1

File tree

2 files changed

+8
-6
lines changed

2 files changed

+8
-6
lines changed

articles/aks/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -422,7 +422,7 @@
422422
- name: AKS-managed Microsoft Entra ID
423423
items:
424424
- name: Enable AKS-managed Microsoft Entra integration
425-
href: managed-azure-ad.md
425+
href: enable-authentication-microsoft-entra-id.md
426426
- name: Manage local accounts
427427
href: manage-local-accounts-managed-azure-ad.md
428428
- name: Cluster access control

articles/aks/enable-authentication-microsoft-entra-id.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: Enable Managed Identity Authentication
3-
description: Learn how to enable Microsoft Entra ID on AKS with kubelogin. Connect your clusters to authenticate Azure users with credentials or managed roles.
3+
description: Learn how to enable Microsoft Entra ID on Azure Kubernetes Service with kubelogin and authenticateAzure users with credentials or managed roles.
44
ms.topic: article
5-
ms.date: 11/13/2023
5+
ms.date: 11/22/2023
66
ms.custom: devx-track-azurecli
77
ms.author: miwithro
88
---
@@ -18,13 +18,15 @@ Learn more about the Microsoft Entra integration flow in the [Microsoft Entra do
1818
## Limitations of integration
1919

2020
Azure Managed ID on AKS has certain limits to account for before you make a decision.
21+
2122
* The integration can't be disabled once added.
2223
* Downgrades from an integrated cluster to the legacy Microsoft Entra ID clusters aren't supported.
2324
* Clusters without Kubernetes RBAC support are unable to add the integration.
2425

2526
## Before you begin
2627

27-
There are a few requirements to properly install the aks addon for managed identity.
28+
The following requirements need to be met in order to properly install the AKS addon for managed identity.
29+
2830
* You have Azure CLI version 2.29.0 or later installed and configured. Run `az --version` to find the version. If you need to install or upgrade, see [Install Azure CLI](/cli/azure/install-azure-cli).
2931
* You need `kubectl` with a minimum version of [1.18.1](https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG/CHANGELOG-1.18.md#v1181) or [`kubelogin`][kubelogin]. With the Azure CLI and the Azure PowerShell module, these two commands are included and automatically managed. Meaning, they're upgraded by default and running `az aks install-cli` isn't required or recommended. If you're using an automated pipeline, you need to manage upgrades for the correct or latest version. The difference between the minor versions of Kubernetes and `kubectl` shouldn't be more than *one* version. Otherwise, authentication issues occur on the wrong version.
3032
* If you're using [helm](https://github.com/helm/helm), you need a minimum version of helm 3.3.
@@ -174,9 +176,9 @@ There are some non-interactive scenarios that don't support `kubectl`. In these
174176
## Troubleshoot access issues
175177
176178
> [!IMPORTANT]
177-
> The steps described in this section bypass the normal Microsoft Entra group authentication. Use them only in an emergency.
179+
> The step described in this section suggests an alternative authentication method compared to the normal Microsoft Entra group authentication. Use this option only in an emergency.
178180
179-
If you lack admin access to a valid Microsoft Entra group, you can follow this workaround. Sign in through the [Azure Kubernetes Service Cluster Admin](../role-based-access-control/built-in-roles.md#azure-kubernetes-service-cluster-admin-role) role and grant your group or tenant admin credentials to access your cluster.
181+
If you lack administrative access to a valid Microsoft Entra group, you can follow this workaround. Sign in with an account that is a member of the [Azure Kubernetes Service Cluster Admin](../role-based-access-control/built-in-roles.md#azure-kubernetes-service-cluster-admin-role) role and grant your group or tenant admin credentials to access your cluster.
180182
181183
## Next steps
182184

0 commit comments

Comments
 (0)