You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/use-managed-identity.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ You must have the following resource installed:
18
18
- The Azure CLI, version 2.23.0 or later
19
19
20
20
> [!NOTE]
21
-
> AKS will create a kubelet MI in the Node resource group if you do not BYO kubelet MI.
21
+
> AKS will create a kubelet MI in the Node resource group if you do not bring your own kubelet MI.
22
22
23
23
## Limitations
24
24
@@ -138,7 +138,7 @@ az aks show -g <RGName> -n <ClusterName> --query "identity"
138
138
> Permission grants to cluster Managed Identity used by Azure Cloud provider may take up 60 minutes to populate.
139
139
140
140
141
-
## Bring your own (BYO) control plane MI
141
+
## Bring your own control plane MI
142
142
A custom control plane identity enables access to be granted to the existing identity prior to cluster creation. This feature enables scenarios such as using a custom VNET or outboundType of UDR with a pre-created managed identity.
143
143
144
144
You must have the Azure CLI, version 2.15.1 or later installed.
@@ -189,7 +189,7 @@ A successful cluster creation using your own managed identities contains this us
189
189
},
190
190
```
191
191
192
-
## Bring your own (BYO) kubelet MI
192
+
## Bring your own kubelet MI
193
193
194
194
A Kubelet identity enables access to be granted to the existing identity prior to cluster creation. This feature enables scenarios such as connection to ACR with a pre-created managed identity.
195
195
@@ -198,7 +198,7 @@ A Kubelet identity enables access to be granted to the existing identity prior t
198
198
199
199
200
200
> [!NOTE]
201
-
> For BYO kubelet MI,Azure CLI will automatically add required role assignment for control plane MI. If you are using ARM template or other clients, you need to create the role assignment manually. It can be done using CLI command 'az role assignment create --assignee <control-plane-identity-object-id> --role "Managed Identity Operator" --scope <kubelet-identity-resource-id>'
201
+
> For bring-your-own kubelet MI,Azure CLI will automatically add required role assignment for control plane MI. If you are using ARM template or other clients, you need to create the role assignment manually. It can be done using CLI command 'az role assignment create --assignee <controlplaneidentityobjectid> --role "Managed Identity Operator" --scope <kubeletidentityresourceid>'
0 commit comments