Skip to content

Commit 9cf6463

Browse files
committed
Editing pass for consistent formatting
1 parent 8b6903a commit 9cf6463

File tree

1 file changed

+13
-9
lines changed

1 file changed

+13
-9
lines changed

articles/aks/control-kubeconfig-access.md

Lines changed: 13 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -27,13 +27,13 @@ There are two Azure roles you can apply to an Azure Active Directory (Azure AD)
2727

2828
1. **Azure Kubernetes Service Cluster Admin Role**
2929

30-
* Allows access to *Microsoft.ContainerService/managedClusters/listClusterAdminCredential/action* API call. This API call [lists the cluster admin credentials][api-cluster-admin].
31-
* Downloads *kubeconfig* for the *clusterAdmin* role.
30+
* Allows access to `Microsoft.ContainerService/managedClusters/listClusterAdminCredential/action` API call. This API call [lists the cluster admin credentials][api-cluster-admin].
31+
* Downloads *kubeconfig* for the *clusterAdmin* role.
3232

3333
2. **Azure Kubernetes Service Cluster User Role**
3434

35-
* Allows access to *Microsoft.ContainerService/managedClusters/listClusterUserCredential/action* API call. This API call [lists the cluster user credentials][api-cluster-user].
36-
* Downloads *kubeconfig* for *clusterUser* role.
35+
* Allows access to `Microsoft.ContainerService/managedClusters/listClusterUserCredential/action` API call. This API call [lists the cluster user credentials][api-cluster-user].
36+
* Downloads *kubeconfig* for *clusterUser* role.
3737

3838
> [!NOTE]
3939
> On clusters that use Azure AD, users with the *clusterUser* role have an empty *kubeconfig* file that prompts a login. Once logged in, users have access based on their Azure AD user or group settings. Users with the *clusterAdmin* role have admin access.
@@ -42,11 +42,11 @@ There are two Azure roles you can apply to an Azure Active Directory (Azure AD)
4242
4343
## Assign role permissions to a user or group
4444

45-
To assign one of the available roles, you need to get the resource ID of the AKS cluster and the ID of the Azure AD user account or group using the following commands:
45+
To assign one of the available roles, you need to get the resource ID of the AKS cluster and the ID of the Azure AD user account or group using the following steps:
4646

47-
* Get the cluster resource ID using the [`az aks show`][az-aks-show] command for the cluster named *myAKSCluster* in the *myResourceGroup* resource group. Provide your own cluster and resource group name as needed.
48-
* Use the [`az account show`][az-account-show] and [`az ad user show`][az-ad-user-show] commands to get your user ID.
49-
* Assign a role using the [`az role assignment create`][az-role-assignment-create] command.
47+
1. Get the cluster resource ID using the [`az aks show`][az-aks-show] command for the cluster named *myAKSCluster* in the *myResourceGroup* resource group. Provide your own cluster and resource group name as needed.
48+
2. Use the [`az account show`][az-account-show] and [`az ad user show`][az-ad-user-show] commands to get your user ID.
49+
3. Assign a role using the [`az role assignment create`][az-role-assignment-create] command.
5050

5151
The following example assigns the *Azure Kubernetes Service Cluster Admin Role* to an individual user account:
5252

@@ -76,7 +76,7 @@ az ad group show --group appdev --query objectId -o tsv
7676
> [!IMPORTANT]
7777
> In some cases, such as Azure AD guest users, the *user.name* in the account is different than the *userPrincipalName*.
7878
>
79-
> ```output
79+
> ```azurecli-interactive
8080
> $ az account show --query user.name -o tsv
8181
8282
>
@@ -102,7 +102,11 @@ You can then use the [`kubectl config view`][kubectl-config-view] command to ver
102102

103103
```azurecli-interactive
104104
$ kubectl config view
105+
```
105106

107+
Your output should look similar to the following example output:
108+
109+
```azurecli-interactive
106110
apiVersion: v1
107111
clusters:
108112
- cluster:

0 commit comments

Comments
 (0)