You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/enable-authentication-microsoft-entra-id.md
+7-3Lines changed: 7 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,19 +2,21 @@
2
2
title: Enable managed identity authentication on Azure Kubernetes Service
3
3
description: Learn how to enable Microsoft Entra ID on Azure Kubernetes Service with kubelogin and authenticate Azure users with credentials or managed roles.
4
4
ms.topic: article
5
-
ms.date: 11/22/2023
5
+
ms.date: 02/08/2024
6
6
ms.custom: devx-track-azurecli
7
7
ms.author: miwithro
8
8
---
9
9
10
10
# Enable Azure managed identity authentication for Kubernetes clusters with kubelogin
11
11
12
-
The AKS-managed Microsoft Entra integration simplifies the Microsoft Entra integration process. Previously, you were required to create a client and server app, and the Microsoft Entra tenant had to grant Directory Read permissions. Now, the AKS resource provider manages the client and server apps for you.
12
+
The AKS-managed Microsoft Entra integration simplifies the Microsoft Entra integration process. Previously, you were required to create a client and server app, and the Microsoft Entra tenant had to assign [Directory Readers][directory-readers-rbac-role] role permissions. Now, the AKS resource provider manages the client and server apps for you.
13
13
14
14
Cluster administrators can configure Kubernetes role-based access control (Kubernetes RBAC) based on a user's identity or directory group membership. Microsoft Entra authentication is provided to AKS clusters with OpenID Connect. OpenID Connect is an identity layer built on top of the OAuth 2.0 protocol. For more information on OpenID Connect, see the [OpenID Connect documentation][open-id-connect].
15
15
16
16
Learn more about the Microsoft Entra integration flow in the [Microsoft Entra documentation](concepts-identity.md#azure-ad-integration).
17
17
18
+
This article provides details on how to enable and use managed identities for Azure resources with your AKS cluster.
19
+
18
20
## Limitations
19
21
20
22
The following are constraints integrating Azure managed identity authentication on AKS.
@@ -184,18 +186,20 @@ If you lack administrative access to a valid Microsoft Entra group, you can foll
184
186
185
187
* Learn about [Microsoft Entra integration with Kubernetes RBAC][azure-ad-rbac].
186
188
* Learn more about [AKS and Kubernetes identity concepts][aks-concepts-identity].
189
+
* Learn how to [use kubelogin][kubelogin-authentication] for all supported Microsoft Entra authentication methods in AKS.
187
190
* Use [Azure Resource Manager (ARM) templates][aks-arm-template] to create AKS-managed Microsoft Entra ID enabled clusters.
Copy file name to clipboardExpand all lines: articles/aks/use-managed-identity.md
+18-5Lines changed: 18 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,14 +5,26 @@ ms.topic: article
5
5
ms.custom:
6
6
- devx-track-azurecli
7
7
- ignite-2023
8
-
ms.date: 01/25/2024
8
+
ms.date: 02/08/2024
9
9
---
10
10
11
11
# Use a managed identity in Azure Kubernetes Service (AKS)
12
12
13
-
Azure Kubernetes Service (AKS) clusters require an identity to access Azure resources like load balancers and managed disks. This identity can be a *managed identity* or *service principal*. A system-assigned managed identity is automatically created when you create an AKS cluster. This identity is managed by the Azure platform and doesn't require you to provision or rotate any secrets. For more information about managed identities in Microsoft Entra ID, see [Managed identities for Azure resources][managed-identity-resources-overview].
13
+
Azure Kubernetes Service (AKS) clusters require an identity to access Azure resources like load balancers and managed disks. The identity can be a *managed identity* or a *service principal*.
14
14
15
-
AKS doesn't automatically create a [service principal](kubernetes-service-principal.md), so you have to create one. Clusters that use a service principal eventually expire, and the service principal must be renewed to avoid impacting cluster authentication with the identity. Managing service principals adds complexity, so it's easier to use managed identities instead. The same permission requirements apply for both service principals and managed identities. Managed identities use certificate-based authentication. Each managed identity's credentials have an expiration of *90 days* and are rolled after *45 days*. AKS uses both system-assigned and user-assigned managed identity types, and these identities are immutable.
15
+
This article provides details on how to enable the following managed identity types on a new or existing AKS cluster:
16
+
17
+
* System-assigned managed identity
18
+
* Bring your own user-assigned managed identity
19
+
* Pre-created Kubelet managed identity
20
+
21
+
## Overview
22
+
23
+
When you deploy an AKS cluster, a system-assigned managed identity is automatically created, and it's managed by the Azure platform, so it doesn't require you to provision or rotate any secrets. For more information, see [managed identities for Azure resources][managed-identity-resources-overview].
24
+
25
+
AKS doesn't automatically create a [service principal](kubernetes-service-principal.md), so you have to create one. Clusters that use a service principal eventually expire, and the service principal must be renewed to avoid impacting cluster authentication with the identity. Managing service principals adds complexity, so it's easier to use managed identities instead. The same permission requirements apply for both service principals and managed identities. Managed identities use certificate-based authentication. Each managed identity's credentials have an expiration of *90 days* and are rolled after *45 days*.
26
+
27
+
AKS uses both system-assigned and user-assigned managed identity types, and these identities are immutable.
16
28
17
29
> [!IMPORTANT]
18
30
> The open source [Microsoft Entra pod-managed identity][entra-id-pod-managed-identity] (preview) in Azure Kubernetes Service was deprecated on 10/24/2022, and the project archived in Sept. 2023. For more information, see the [deprecation notice](https://github.com/Azure/aad-pod-identity#-announcement). The AKS Managed add-on begins deprecation in Sept. 2024.
@@ -54,7 +66,7 @@ AKS uses several managed identities for built-in services and add-ons.
54
66
| Add-on | Ingress application gateway | Manages required network resources. | Contributor role for node resource group | No
55
67
| Add-on | omsagent | Used to send AKS metrics to Azure Monitor. | Monitoring Metrics Publisher role | No
56
68
| Add-on | Virtual-Node (ACIConnector) | Manages required network resources for Azure Container Instances (ACI). | Contributor role for node resource group | No
57
-
| Add-on | Cost analysis | Used to gather cost allocation data ||
69
+
| Add-on | Cost analysis | Used to gather cost allocation data ||
58
70
| OSS project | Microsoft Entra ID-pod-identity | Enables applications to access cloud resources securely with Microsoft Entra ID. | N/A | Steps to grant permission at [Microsoft Entra Pod Identity Role Assignment configuration](./use-azure-ad-pod-identity.md).
59
71
60
72
## Enable managed identities on a new AKS cluster
@@ -471,7 +483,8 @@ Now you can create your AKS cluster with your existing identities. Make sure to
471
483
472
484
## Next steps
473
485
474
-
Use [Azure Resource Manager templates][aks-arm-template] to create a managed identity-enabled cluster.
486
+
* Use [Azure Resource Manager templates][aks-arm-template] to create a managed identity-enabled cluster.
487
+
* Learn how to [use kubelogin][kubelogin-authentication] for all supported Microsoft Entra authentication methods in AKS.
0 commit comments