You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/managed-aad.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ Before getting started, make sure you have the following prerequisites:
29
29
30
30
* Azure CLI version 2.29.0 or later.
31
31
*`kubectl`, with a minimum version of [1.18.1](https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG/CHANGELOG-1.18.md#v1181) or [`kubelogin`](https://github.com/Azure/kubelogin).
32
-
* If you're using [helm](https://github.com/helm/helm), a minimum version of helm 3.3.
32
+
* If you're using [helm](https://github.com/helm/helm), you need a minimum version of helm 3.3.
33
33
34
34
> [!IMPORTANT]
35
35
> You must use `kubectl` with a minimum version of 1.18.1 or `kubelogin`. The difference between the minor versions of Kubernetes and `kubectl` shouldn't be more than 1 version. You'll experience authentication issues if you don't use the correct version.
1. Configure [Azure role-based access control (Azure RBAC)](./azure-ad-rbac.md) to configure additional security groups for your clusters.
117
+
1. Configure [Azure role-based access control (Azure RBAC)](./azure-ad-rbac.md) to configure other security groups for your clusters.
118
118
119
119
## Troubleshooting access issues with Azure AD
120
120
121
121
> [!IMPORTANT]
122
-
> The steps described below bypass the normal Azure AD group authentication. Use them only in an emergency.
122
+
> The steps described in this section bypass the normal Azure AD group authentication. Use them only in an emergency.
123
123
124
124
If you're permanently blocked by not having access to a valid Azure AD group with access to your cluster, you can still obtain the admin credentials to access the cluster directly.
125
125
@@ -185,7 +185,7 @@ There are some non-interactive scenarios, such as continuous integration pipelin
185
185
186
186
## Disable local accounts
187
187
188
-
When deploying an AKS cluster, local accounts are enabled by default. Even when enabling RBAC or Azure AD integration, `--admin` access still exists, essentially as a non-auditable backdoor option. With this in mind, AKS offers the ability to disable local accounts via a flag, `disable-local-accounts`. A field, `properties.disableLocalAccounts`, has also been added to the managed cluster API to indicate whether the feature has been enabled on the cluster.
188
+
When deploying an AKS cluster, local accounts are enabled by default. Even when enabling RBAC or Azure AD integration, `--admin` access still exists, essentially as a non-auditable backdoor option. AKS offers the ability to disable local accounts via a flag, `disable-local-accounts`. A field, `properties.disableLocalAccounts`, has also been added to the managed cluster API to indicate whether the feature has been enabled on the cluster.
189
189
190
190
> [!NOTE]
191
191
>
@@ -216,7 +216,7 @@ Attempting to get admin credentials will fail with an error message indicating t
216
216
```azurecli-interactive
217
217
az aks get-credentials --resource-group <resource-group> --name <cluster-name> --admin
218
218
219
-
Operation failed with status: 'Bad Request'. Details: Getting static credential is not allowed because this cluster is set to disable local accounts.
219
+
Operation failed with status: 'Bad Request'. Details: Getting static credential isn't allowed because this cluster is set to disable local accounts.
220
220
```
221
221
222
222
### Disable local accounts on an existing cluster
@@ -242,7 +242,7 @@ Attempting to get admin credentials will fail with an error message indicating t
242
242
```azurecli-interactive
243
243
az aks get-credentials --resource-group <resource-group> --name <cluster-name> --admin
244
244
245
-
Operation failed with status: 'Bad Request'. Details: Getting static credential is not allowed because this cluster is set to disable local accounts.
245
+
Operation failed with status: 'Bad Request'. Details: Getting static credential isn't allowed because this cluster is set to disable local accounts.
246
246
```
247
247
248
248
### Re-enable local accounts on an existing cluster
@@ -361,7 +361,7 @@ Use the `kubectl get nodes` command to view nodes in the cluster:
361
361
kubectl get nodes
362
362
```
363
363
364
-
Note the authentication requirement and follow the steps to authenticate. If successful, you should see output similar to the following:
364
+
Note the authentication requirement and follow the steps to authenticate. If successful, you should see an output similar to the following output:
365
365
366
366
```output
367
367
To sign in, use a web browser to open the page https://microsoft.com/devicelogin and enter the code AAAAAAAAA to authenticate.
az role assignment create --role "Azure Kubernetes Service RBAC Reader" --assignee <AAD-ENTITY-ID> --scope $AKS_ID/namespaces/<namespace-name>
381
381
```
382
382
383
-
3. Associate the group you just configured at the namespace level with PIM to complete the configuration.
383
+
1. Associate the group you configured at the namespace level with PIM to complete the configuration.
384
384
385
385
### Troubleshooting
386
386
387
-
If `kubectl get nodes` returns an error similar to the following:
387
+
If `kubectl get nodes` returns an error similar to the following error:
388
388
389
389
```output
390
390
Error from server (Forbidden): nodes is forbidden: User "aaaa11111-11aa-aa11-a1a1-111111aaaaa" cannot list resource "nodes" in API group "" at the cluster scope
0 commit comments