Skip to content

Commit 8388e9a

Browse files
Merge pull request #265756 from MGoedtel/task209188
updated AKS managed-id articles
2 parents 8cae578 + ee9392c commit 8388e9a

File tree

2 files changed

+25
-8
lines changed

2 files changed

+25
-8
lines changed

articles/aks/enable-authentication-microsoft-entra-id.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,19 +2,21 @@
22
title: Enable managed identity authentication on Azure Kubernetes Service
33
description: Learn how to enable Microsoft Entra ID on Azure Kubernetes Service with kubelogin and authenticate Azure users with credentials or managed roles.
44
ms.topic: article
5-
ms.date: 11/22/2023
5+
ms.date: 02/08/2024
66
ms.custom: devx-track-azurecli
77
ms.author: miwithro
88
---
99

1010
# Enable Azure managed identity authentication for Kubernetes clusters with kubelogin
1111

12-
The AKS-managed Microsoft Entra integration simplifies the Microsoft Entra integration process. Previously, you were required to create a client and server app, and the Microsoft Entra tenant had to grant Directory Read permissions. Now, the AKS resource provider manages the client and server apps for you.
12+
The AKS-managed Microsoft Entra integration simplifies the Microsoft Entra integration process. Previously, you were required to create a client and server app, and the Microsoft Entra tenant had to assign [Directory Readers][directory-readers-rbac-role] role permissions. Now, the AKS resource provider manages the client and server apps for you.
1313

1414
Cluster administrators can configure Kubernetes role-based access control (Kubernetes RBAC) based on a user's identity or directory group membership. Microsoft Entra authentication is provided to AKS clusters with OpenID Connect. OpenID Connect is an identity layer built on top of the OAuth 2.0 protocol. For more information on OpenID Connect, see the [OpenID Connect documentation][open-id-connect].
1515

1616
Learn more about the Microsoft Entra integration flow in the [Microsoft Entra documentation](concepts-identity.md#azure-ad-integration).
1717

18+
This article provides details on how to enable and use managed identities for Azure resources with your AKS cluster.
19+
1820
## Limitations
1921

2022
The following are constraints integrating Azure managed identity authentication on AKS.
@@ -184,18 +186,20 @@ If you lack administrative access to a valid Microsoft Entra group, you can foll
184186
185187
* Learn about [Microsoft Entra integration with Kubernetes RBAC][azure-ad-rbac].
186188
* Learn more about [AKS and Kubernetes identity concepts][aks-concepts-identity].
189+
* Learn how to [use kubelogin][kubelogin-authentication] for all supported Microsoft Entra authentication methods in AKS.
187190
* Use [Azure Resource Manager (ARM) templates][aks-arm-template] to create AKS-managed Microsoft Entra ID enabled clusters.
188-
189191
<!-- LINKS - external -->
190192
[aks-arm-template]: /azure/templates/microsoft.containerservice/managedclusters
191193
[kubelogin]: https://github.com/Azure/kubelogin
192194
[azure-kubelogin-known-issues]: https://azure.github.io/kubelogin/known-issues.html
193195
194196
<!-- LINKS - Internal -->
197+
[directory-readers-rbac-role]: /entra/identity/role-based-access-control/permissions-reference#directory-readers
195198
[aks-concepts-identity]: concepts-identity.md
196199
[azure-ad-rbac]: azure-ad-rbac.md
197200
[az-aks-create]: /cli/azure/aks#az_aks_create
198201
[az-aks-get-credentials]: /cli/azure/aks#az_aks_get_credentials
199202
[az-group-create]: /cli/azure/group#az_group_create
200203
[open-id-connect]:../active-directory/develop/v2-protocols-oidc.md
201204
[az-aks-update]: /cli/azure/aks#az_aks_update
205+
[kubelogin-authentication]: kubelogin-authentication.md

articles/aks/use-managed-identity.md

Lines changed: 18 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,26 @@ ms.topic: article
55
ms.custom:
66
- devx-track-azurecli
77
- ignite-2023
8-
ms.date: 01/25/2024
8+
ms.date: 02/08/2024
99
---
1010

1111
# Use a managed identity in Azure Kubernetes Service (AKS)
1212

13-
Azure Kubernetes Service (AKS) clusters require an identity to access Azure resources like load balancers and managed disks. This identity can be a *managed identity* or *service principal*. A system-assigned managed identity is automatically created when you create an AKS cluster. This identity is managed by the Azure platform and doesn't require you to provision or rotate any secrets. For more information about managed identities in Microsoft Entra ID, see [Managed identities for Azure resources][managed-identity-resources-overview].
13+
Azure Kubernetes Service (AKS) clusters require an identity to access Azure resources like load balancers and managed disks. The identity can be a *managed identity* or a *service principal*.
1414

15-
AKS doesn't automatically create a [service principal](kubernetes-service-principal.md), so you have to create one. Clusters that use a service principal eventually expire, and the service principal must be renewed to avoid impacting cluster authentication with the identity. Managing service principals adds complexity, so it's easier to use managed identities instead. The same permission requirements apply for both service principals and managed identities. Managed identities use certificate-based authentication. Each managed identity's credentials have an expiration of *90 days* and are rolled after *45 days*. AKS uses both system-assigned and user-assigned managed identity types, and these identities are immutable.
15+
This article provides details on how to enable the following managed identity types on a new or existing AKS cluster:
16+
17+
* System-assigned managed identity
18+
* Bring your own user-assigned managed identity
19+
* Pre-created Kubelet managed identity
20+
21+
## Overview
22+
23+
When you deploy an AKS cluster, a system-assigned managed identity is automatically created, and it's managed by the Azure platform, so it doesn't require you to provision or rotate any secrets. For more information, see [managed identities for Azure resources][managed-identity-resources-overview].
24+
25+
AKS doesn't automatically create a [service principal](kubernetes-service-principal.md), so you have to create one. Clusters that use a service principal eventually expire, and the service principal must be renewed to avoid impacting cluster authentication with the identity. Managing service principals adds complexity, so it's easier to use managed identities instead. The same permission requirements apply for both service principals and managed identities. Managed identities use certificate-based authentication. Each managed identity's credentials have an expiration of *90 days* and are rolled after *45 days*.
26+
27+
AKS uses both system-assigned and user-assigned managed identity types, and these identities are immutable.
1628

1729
> [!IMPORTANT]
1830
> The open source [Microsoft Entra pod-managed identity][entra-id-pod-managed-identity] (preview) in Azure Kubernetes Service was deprecated on 10/24/2022, and the project archived in Sept. 2023. For more information, see the [deprecation notice](https://github.com/Azure/aad-pod-identity#-announcement). The AKS Managed add-on begins deprecation in Sept. 2024.
@@ -54,7 +66,7 @@ AKS uses several managed identities for built-in services and add-ons.
5466
| Add-on | Ingress application gateway | Manages required network resources. | Contributor role for node resource group | No
5567
| Add-on | omsagent | Used to send AKS metrics to Azure Monitor. | Monitoring Metrics Publisher role | No
5668
| Add-on | Virtual-Node (ACIConnector) | Manages required network resources for Azure Container Instances (ACI). | Contributor role for node resource group | No
57-
| Add-on | Cost analysis | Used to gather cost allocation data | |
69+
| Add-on | Cost analysis | Used to gather cost allocation data | |
5870
| OSS project | Microsoft Entra ID-pod-identity | Enables applications to access cloud resources securely with Microsoft Entra ID. | N/A | Steps to grant permission at [Microsoft Entra Pod Identity Role Assignment configuration](./use-azure-ad-pod-identity.md).
5971

6072
## Enable managed identities on a new AKS cluster
@@ -471,7 +483,8 @@ Now you can create your AKS cluster with your existing identities. Make sure to
471483
472484
## Next steps
473485
474-
Use [Azure Resource Manager templates][aks-arm-template] to create a managed identity-enabled cluster.
486+
* Use [Azure Resource Manager templates][aks-arm-template] to create a managed identity-enabled cluster.
487+
* Learn how to [use kubelogin][kubelogin-authentication] for all supported Microsoft Entra authentication methods in AKS.
475488
476489
<!-- LINKS - external -->
477490
[aks-arm-template]: /azure/templates/microsoft.containerservice/managedclusters

0 commit comments

Comments
 (0)