Skip to content

Commit 5aa4901

Browse files
authored
Merge pull request #52870 from TomGeske/patch-3
Custom VNET required permissions infobox
2 parents 92b61b1 + aeb4df6 commit 5aa4901

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

articles/aks/use-managed-identity.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ AKS creates two managed identities:
2020
- **System-assigned managed identity**: The identity that the Kubernetes cloud provider uses to create Azure resources on behalf of the user. The life cycle of the system-assigned identity is tied to that of the cluster. The identity is deleted when the cluster is deleted.
2121
- **User-assigned managed identity**: The identity that's used for authorization in the cluster. For example, the user-assigned identity is used to authorize AKS to use Azure Container Registries (ACRs), or to authorize the kubelet to get metadata from Azure.
2222

23-
Add-ons also authenticate using a managed identity. For each add-on, a managed identity is created by AKS and lasts for the life of the add-on. For creating and using your own VNet, static IP address, or attached Azure disk where the resources are outside of the MC_* resource group, use the PrincipalID of the cluster to perform a role assignment. For more information on role assignment, see [Delegate access to other Azure resources](kubernetes-service-principal.md#delegate-access-to-other-azure-resources).
23+
Add-ons also authenticate using a managed identity. For each add-on, a managed identity is created by AKS and lasts for the life of the add-on.
2424

2525
## Before you begin
2626

@@ -54,6 +54,9 @@ A successful cluster creation using managed identities contains this service pri
5454
}
5555
```
5656

57+
> [!NOTE]
58+
> For creating and using your own VNet, static IP address, or attached Azure disk where the resources are outside of the MC_* resource group, use the PrincipalID of the cluster System Assigned Managed Identity to perform a role assignment. For more information on role assignment, see [Delegate access to other Azure resources](kubernetes-service-principal.md#delegate-access-to-other-azure-resources).
59+
5760
Finally, get credentials to access the cluster:
5861

5962
```azurecli-interactive

0 commit comments

Comments
 (0)