Skip to content

Commit 2a5c017

Browse files
Merge pull request #223943 from schaffererin/aad-cluster-rolebinding
Adding same messaging from legacy docs that explains how to assign permissions based on whether the user is in the same Azure AD tenant
2 parents 75be56b + e666f47 commit 2a5c017

File tree

1 file changed

+2
-0
lines changed

1 file changed

+2
-0
lines changed

articles/aks/azure-ad-rbac.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -184,6 +184,8 @@ kubectl create namespace dev
184184

185185
> [!NOTE]
186186
> In Kubernetes, *Roles* define the permissions to grant, and *RoleBindings* apply them to desired users or groups. These assignments can be applied to a given namespace, or across the entire cluster. For more information, see [Using Kubernetes RBAC authorization][rbac-authorization].
187+
>
188+
> If the user you grant the Kubernetes RBAC binding for is in the same Azure AD tenant, assign permissions based on the *userPrincipalName (UPN)*. If the user is in a different Azure AD tenant, query for and use the *objectId* property instead.
187189
188190
3. Create a Role for the *dev* namespace, which grants full permissions to the namespace. In production environments, you can specify more granular permissions for different users or groups. Create a file named `role-dev-namespace.yaml` and paste the following YAML manifest:
189191

0 commit comments

Comments
 (0)