Skip to content

Commit 7113609

Browse files
committed
Fix note formatting
1 parent 19c661e commit 7113609

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/aks/control-kubeconfig-access.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Limit access to kubeconfig in Azure Kubernetes Service (AKS)
33
description: Learn how to control access to the Kubernetes configuration file (kubeconfig) for cluster administrators and cluster users
44
services: container-service
55
ms.topic: article
6-
ms.date: 01/28/2020
6+
ms.date: 05/06/2020
77

88
---
99

@@ -36,7 +36,7 @@ The two built-in roles are:
3636

3737
These RBAC roles can be applied to an Azure Active Directory (AD) user or group.
3838

39-
> ![NOTE]
39+
> [!NOTE]
4040
> On clusters that use Azure AD, users with the *clusterUser* role have an empty *kubeconfig* file that prompts a log in. Once logged in, users have access based on their Azure AD user or group settings. Users with the *clusterAdmin* role have admin access.
4141
>
4242
> Clusters that do not use Azure AD only use the *clusterAdmin* role.

0 commit comments

Comments
 (0)