Skip to content

Commit 9beb4f3

Browse files
committed
Working on freshness pass and improving Acrolinx score
1 parent 870d723 commit 9beb4f3

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

articles/aks/managed-aad.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Before getting started, make sure you have the following prerequisites:
2929

3030
* Azure CLI version 2.29.0 or later.
3131
* `kubectl`, with a minimum version of [1.18.1](https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG/CHANGELOG-1.18.md#v1181) or [`kubelogin`](https://github.com/Azure/kubelogin).
32-
* If you're using [helm](https://github.com/helm/helm), a minimum version of helm 3.3.
32+
* If you're using [helm](https://github.com/helm/helm), you need a minimum version of helm 3.3.
3333

3434
> [!IMPORTANT]
3535
> You must use `kubectl` with a minimum version of 1.18.1 or `kubelogin`. The difference between the minor versions of Kubernetes and `kubectl` shouldn't be more than 1 version. You'll experience authentication issues if you don't use the correct version.
@@ -114,12 +114,12 @@ aks-nodepool1-15306047-1 Ready agent 102m v1.15.10
114114
aks-nodepool1-15306047-2 Ready agent 102m v1.15.10
115115
```
116116

117-
1. Configure [Azure role-based access control (Azure RBAC)](./azure-ad-rbac.md) to configure additional security groups for your clusters.
117+
1. Configure [Azure role-based access control (Azure RBAC)](./azure-ad-rbac.md) to configure other security groups for your clusters.
118118

119119
## Troubleshooting access issues with Azure AD
120120

121121
> [!IMPORTANT]
122-
> The steps described below bypass the normal Azure AD group authentication. Use them only in an emergency.
122+
> The steps described in this section bypass the normal Azure AD group authentication. Use them only in an emergency.
123123
124124
If you're permanently blocked by not having access to a valid Azure AD group with access to your cluster, you can still obtain the admin credentials to access the cluster directly.
125125

@@ -185,7 +185,7 @@ There are some non-interactive scenarios, such as continuous integration pipelin
185185

186186
## Disable local accounts
187187

188-
When deploying an AKS cluster, local accounts are enabled by default. Even when enabling RBAC or Azure AD integration, `--admin` access still exists, essentially as a non-auditable backdoor option. With this in mind, AKS offers the ability to disable local accounts via a flag, `disable-local-accounts`. A field, `properties.disableLocalAccounts`, has also been added to the managed cluster API to indicate whether the feature has been enabled on the cluster.
188+
When deploying an AKS cluster, local accounts are enabled by default. Even when enabling RBAC or Azure AD integration, `--admin` access still exists, essentially as a non-auditable backdoor option. AKS offers the ability to disable local accounts via a flag, `disable-local-accounts`. A field, `properties.disableLocalAccounts`, has also been added to the managed cluster API to indicate whether the feature has been enabled on the cluster.
189189

190190
> [!NOTE]
191191
>
@@ -216,7 +216,7 @@ Attempting to get admin credentials will fail with an error message indicating t
216216
```azurecli-interactive
217217
az aks get-credentials --resource-group <resource-group> --name <cluster-name> --admin
218218
219-
Operation failed with status: 'Bad Request'. Details: Getting static credential is not allowed because this cluster is set to disable local accounts.
219+
Operation failed with status: 'Bad Request'. Details: Getting static credential isn't allowed because this cluster is set to disable local accounts.
220220
```
221221

222222
### Disable local accounts on an existing cluster
@@ -242,7 +242,7 @@ Attempting to get admin credentials will fail with an error message indicating t
242242
```azurecli-interactive
243243
az aks get-credentials --resource-group <resource-group> --name <cluster-name> --admin
244244
245-
Operation failed with status: 'Bad Request'. Details: Getting static credential is not allowed because this cluster is set to disable local accounts.
245+
Operation failed with status: 'Bad Request'. Details: Getting static credential isn't allowed because this cluster is set to disable local accounts.
246246
```
247247

248248
### Re-enable local accounts on an existing cluster
@@ -361,7 +361,7 @@ Use the `kubectl get nodes` command to view nodes in the cluster:
361361
kubectl get nodes
362362
```
363363

364-
Note the authentication requirement and follow the steps to authenticate. If successful, you should see output similar to the following:
364+
Note the authentication requirement and follow the steps to authenticate. If successful, you should see an output similar to the following output:
365365

366366
```output
367367
To sign in, use a web browser to open the page https://microsoft.com/devicelogin and enter the code AAAAAAAAA to authenticate.
@@ -380,11 +380,11 @@ aks-nodepool1-61156405-vmss000002 Ready agent 6m33s v1.18.14
380380
az role assignment create --role "Azure Kubernetes Service RBAC Reader" --assignee <AAD-ENTITY-ID> --scope $AKS_ID/namespaces/<namespace-name>
381381
```
382382

383-
3. Associate the group you just configured at the namespace level with PIM to complete the configuration.
383+
1. Associate the group you configured at the namespace level with PIM to complete the configuration.
384384

385385
### Troubleshooting
386386

387-
If `kubectl get nodes` returns an error similar to the following:
387+
If `kubectl get nodes` returns an error similar to the following error:
388388

389389
```output
390390
Error from server (Forbidden): nodes is forbidden: User "aaaa11111-11aa-aa11-a1a1-111111aaaaa" cannot list resource "nodes" in API group "" at the cluster scope

0 commit comments

Comments
 (0)