Skip to content

Commit 68adb35

Browse files
committed
Learn Editor: Update cluster-connect.md
1 parent 6149c04 commit 68adb35

File tree

1 file changed

+18
-6
lines changed

1 file changed

+18
-6
lines changed

articles/azure-arc/kubernetes/cluster-connect.md

Lines changed: 18 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -78,22 +78,28 @@ Before you begin, review the [conceptual overview of the cluster connect feature
7878

7979
## Set up authentication
8080

81-
On the existing Arc-enabled cluster, create the ClusterRoleBinding with either Microsoft Entra authentication, or a service account token.
81+
On the existing Arc-enabled cluster, create the ClusterRoleBinding with either Microsoft Entra authentication or service account token.
8282

8383
<a name='azure-active-directory-authentication-option'></a>
8484

8585
### Microsoft Entra authentication option
8686

8787
#### [Azure CLI](#tab/azure-cli)
8888

89-
1. Get the `objectId` associated with your Microsoft Entra entity.
90-
91-
- For a Microsoft Entra user account:
89+
1. Get the `objectId` associated with your Microsoft Entra entity.
9290

91+
- For a Microsoft Entra group account:
92+
9393
```azurecli
9494
AAD_ENTITY_OBJECT_ID=$(az ad signed-in-user show --query id -o tsv)
9595
```
9696
97+
- For a Microsoft Entra single user account:
98+
99+
```azurecli
100+
AAD_ENTITY_OBJECT_ID=$(az ad signed-in-user show --query userPrincipalName -o tsv)
101+
```
102+
97103
- For a Microsoft Entra application:
98104
99105
```azurecli
@@ -119,12 +125,18 @@ On the existing Arc-enabled cluster, create the ClusterRoleBinding with either M
119125
120126
1. Get the `objectId` associated with your Microsoft Entra entity.
121127
122-
- For a Microsoft Entra user account:
128+
- For a Microsoft Entra group account:
123129
124130
```azurepowershell
125131
$AAD_ENTITY_OBJECT_ID = (az ad signed-in-user show --query id -o tsv)
126132
```
127133
134+
- For a Microsoft Entra single user account:
135+
136+
```azurepowershell
137+
$AAD_ENTITY_OBJECT_ID = (az ad signed-in-user show --query userPrincipalName -o tsv)
138+
```
139+
128140
- For a Microsoft Entra application:
129141
130142
```azurepowershell
@@ -133,7 +145,7 @@ On the existing Arc-enabled cluster, create the ClusterRoleBinding with either M
133145
134146
1. Authorize the entity with appropriate permissions.
135147
136-
- If you're using Kubernetes native ClusterRoleBinding or RoleBinding for authorization checks on the cluster, with the `kubeconfig` file pointing to the `apiserver` of your cluster for direct access, you can create one mapped to the Microsoft Entra entity (service principal or user) that needs to access this cluster. For example:
148+
- If you're using native Kubernetes ClusterRoleBinding or RoleBinding for authorization checks on the cluster, with the `kubeconfig` file pointing to the `apiserver` of your cluster for direct access, you can create one mapped to the Microsoft Entra entity (service principal or user) that needs to access this cluster. For example:
137149
138150
```console
139151
kubectl create clusterrolebinding demo-user-binding --clusterrole cluster-admin --user=$AAD_ENTITY_OBJECT_ID

0 commit comments

Comments
 (0)