Skip to content

Commit 315223a

Browse files
committed
Fixing build errors
1 parent d520642 commit 315223a

7 files changed

+10
-10
lines changed

articles/aks/access-control-managed-azure-ad.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ When you integrate Azure AD with your AKS cluster, you can use [Conditional Acce
2828

2929
4. Under **Assignments**, select **Users and groups**. Choose the users and groups you want to apply the policy to. In this example, choose the same Azure AD group that has administrator access to your cluster.
3030

31-
:::image type="content" source="./media/managed-aad/conditional-access-users-groups.png" alt-text="Screenshot of selecting users or groups to apply the Conditional Access policy." lightbox=source="./media/managed-aad/conditional-access-users-groups.png":::
31+
:::image type="content" source="./media/managed-aad/conditional-access-users-groups.png" alt-text="Screenshot of selecting users or groups to apply the Conditional Access policy." lightbox="./media/managed-aad/conditional-access-users-groups.png":::
3232

3333
5. Under **Cloud apps or actions** > **Include**, select **Select apps**. Search for **Azure Kubernetes Service** and select **Azure Kubernetes Service AAD Server**.
3434

articles/aks/concepts-identity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -162,7 +162,7 @@ As shown in the graphic above, the API server calls the AKS webhook server and p
162162
10. Once authorized, the API server returns a response to `kubectl`.
163163
11. `kubectl` provides feedback to the user.
164164

165-
Learn how to integrate AKS with Azure AD with our [AKS-managed Azure AD integration how-to guide](managed-aad.md).
165+
Learn how to integrate AKS with Azure AD with our [AKS-managed Azure AD integration how-to guide](managed-azure-ad.md).
166166

167167
## AKS service permissions
168168

@@ -282,7 +282,7 @@ For more information on core Kubernetes and AKS concepts, see the following arti
282282
[openid-connect]: ../active-directory/develop/v2-protocols-oidc.md
283283
[az-aks-get-credentials]: /cli/azure/aks#az_aks_get_credentials
284284
[azure-rbac]: ../role-based-access-control/overview.md
285-
[aks-aad]: managed-aad.md
285+
[aks-aad]: managed-azure-ad.md
286286
[aks-concepts-clusters-workloads]: concepts-clusters-workloads.md
287287
[aks-concepts-security]: concepts-security.md
288288
[aks-concepts-scale]: concepts-scale.md

articles/aks/concepts-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -158,7 +158,7 @@ For more information on core Kubernetes and AKS concepts, see:
158158
[microsoft-defender-for-containers]: ../defender-for-cloud/defender-for-containers-introduction.md
159159
[aks-daemonsets]: concepts-clusters-workloads.md#daemonsets
160160
[aks-upgrade-cluster]: upgrade-cluster.md
161-
[aks-aad]: ./managed-aad.md
161+
[aks-aad]: ./managed-azure-ad.md
162162
[aks-add-np-containerd]: learn/quick-windows-container-deploy-cli.md#add-a-windows-server-node-pool-with-containerd
163163
[aks-concepts-clusters-workloads]: concepts-clusters-workloads.md
164164
[aks-concepts-identity]: concepts-identity.md

articles/aks/intro-kubernetes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -170,7 +170,7 @@ Learn more about deploying and managing AKS.
170170
[concepts-identity]: concepts-identity.md
171171
[concepts-storage]: concepts-storage.md
172172
[conf-com-node]: ../confidential-computing/confidential-nodes-aks-overview.md
173-
[aad]: managed-aad.md
173+
[aad]: managed-azure-ad.md
174174
[aks-monitor]: monitor-aks.md
175175
[azure-monitor]: /previous-versions/azure/azure-monitor/containers/containers
176176
[azure-logs]: ../azure-monitor/logs/log-analytics-overview.md

articles/aks/kubernetes-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ This section addresses common problems and troubleshooting steps.
7575
To access the Kubernetes resources, you must have access to the AKS cluster, the Kubernetes API, and the Kubernetes objects. Ensure that you're either a cluster administrator or a user with the appropriate permissions to access the AKS cluster. For more information on cluster security, see [Access and identity options for AKS][concepts-identity].
7676

7777
>[!NOTE]
78-
> The Kubernetes resource view in the Azure portal is only supported by [managed-AAD enabled clusters](managed-aad.md) or non-AAD enabled clusters. If you're using a managed-AAD enabled cluster, your AAD user or identity needs to have the respective roles/role bindings to access the Kubernetes API and the permission to pull the [user `kubeconfig`](control-kubeconfig-access.md).
78+
> The Kubernetes resource view in the Azure portal is only supported by [managed-AAD enabled clusters](managed-azure-ad.md) or non-AAD enabled clusters. If you're using a managed-AAD enabled cluster, your AAD user or identity needs to have the respective roles/role bindings to access the Kubernetes API and the permission to pull the [user `kubeconfig`](control-kubeconfig-access.md).
7979
8080
### Enable resource view
8181

articles/aks/manage-azure-rbac.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,15 +12,15 @@ author: palma21
1212

1313
# Use Azure role-based access control for Kubernetes Authorization
1414

15-
When you leverage [integrated authentication between Azure Active Directory (Azure AD) and AKS](managed-aad.md), you can use Azure AD users, groups, or service principals as subjects in [Kubernetes role-based access control (Kubernetes RBAC)][kubernetes-rbac]. This feature frees you from having to separately manage user identities and credentials for Kubernetes. However, you still have to set up and manage Azure RBAC and Kubernetes RBAC separately.
15+
When you leverage [integrated authentication between Azure Active Directory (Azure AD) and AKS](managed-azure-ad.md), you can use Azure AD users, groups, or service principals as subjects in [Kubernetes role-based access control (Kubernetes RBAC)][kubernetes-rbac]. This feature frees you from having to separately manage user identities and credentials for Kubernetes. However, you still have to set up and manage Azure RBAC and Kubernetes RBAC separately.
1616

1717
This article covers how to use Azure RBAC for Kubernetes Authorization, which allows for the unified management and access control across Azure resources, AKS, and Kubernetes resources. For more information, see [Azure RBAC for Kubernetes Authorization][kubernetes-rbac].
1818

1919
## Before you begin
2020

2121
* You need the Azure CLI version 2.24.0 or later installed and configured. Run `az --version` to find the version. If you need to install or upgrade, see [Install Azure CLI][install-azure-cli].
2222
* You need `kubectl`, with a minimum version of [1.18.3](https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG/CHANGELOG-1.18.md#v1183).
23-
* You need managed Azure AD integration enabled on your cluster before you can add Azure RBAC for Kubernetes authorization. If you need to enable managed Azure AD integration, see [Use Azure AD in AKS](managed-aad.md).
23+
* You need managed Azure AD integration enabled on your cluster before you can add Azure RBAC for Kubernetes authorization. If you need to enable managed Azure AD integration, see [Use Azure AD in AKS](managed-azure-ad.md).
2424
* If you have CRDs and are making custom role definitions, the only way to cover CRDs today is to use `Microsoft.ContainerService/managedClusters/*/read`. For the remaining objects, you can use the specific API groups, such as `Microsoft.ContainerService/apps/deployments/read`.
2525
* New role assignments can take up to five minutes to propagate and be updated by the authorization server.
2626
* This article requires that the Azure AD tenant configured for authentication is same as the tenant for the subscription that holds your AKS cluster.
@@ -224,7 +224,7 @@ To learn more about AKS authentication, authorization, Kubernetes RBAC, and Azur
224224
[az-provider-register]: /cli/azure/provider#az_provider_register
225225
[az-group-create]: /cli/azure/group#az_group_create
226226
[az-aks-update]: /cli/azure/aks#az_aks_update
227-
[managed-aad]: ./managed-aad.md
227+
[managed-aad]: ./managed-azure-ad.md
228228
[install-azure-cli]: /cli/azure/install-azure-cli
229229
[az-role-definition-create]: /cli/azure/role/definition#az_role_definition_create
230230
[az-aks-get-credentials]: /cli/azure/aks#az_aks_get-credentials

articles/aks/operator-best-practices-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -197,7 +197,7 @@ For more information about cluster operations in AKS, see the following best pra
197197

198198
<!-- INTERNAL LINKS -->
199199
[aks-concepts-identity]: concepts-identity.md
200-
[azure-ad-integration]: managed-aad.md
200+
[azure-ad-integration]: managed-azure-ad.md
201201
[aks-aad]: azure-ad-integration-cli.md
202202
[managed-identities]: ../active-directory/managed-identities-azure-resources/overview.md
203203
[aks-best-practices-scheduler]: operator-best-practices-scheduler.md

0 commit comments

Comments
 (0)