Skip to content

Commit aa51d66

Browse files
authored
Merge pull request #109056 from mlearned/mdl-aks-1683228-aadv2
azure ad v2 fixes
2 parents 0c1b97d + c6aad31 commit aa51d66

File tree

2 files changed

+16
-15
lines changed

2 files changed

+16
-15
lines changed

articles/aks/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -221,7 +221,7 @@
221221
href: limit-egress-traffic.md
222222
- name: Enable Azure Active Directory integration
223223
items:
224-
- name: Azure AD v2.0 (preview)
224+
- name: Integrate Azure AD (preview)
225225
href: azure-ad-v2.md
226226
- name: Use the Azure CLI
227227
href: azure-ad-integration-cli.md

articles/aks/azure-ad-v2.md

Lines changed: 15 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,22 @@
11
---
2-
title: Use Azure AD v2.0 in Azure Kubernetes Service
3-
description: Learn how to use Azure AD v2.0 in Azure Kubernetes Service (AKS)
2+
title: Use Azure AD in Azure Kubernetes Service
3+
description: Learn how to use Azure AD in Azure Kubernetes Service (AKS)
44
services: container-service
55
manager: gwallace
66
ms.topic: article
77
ms.date: 03/24/2020
88
---
99

10-
# Integrate Azure AD v2.0 in Azure Kubernetes Service (Preview)
10+
# Integrate Azure AD in Azure Kubernetes Service (Preview)
1111

1212
> [!Note]
13-
> Existing Azure AD v1.0 clusters are not affected by the new Azure AD v2.0 feature for Azure Kubernetes Service (AKS).
13+
> Existing AKS v1 clusters with AD integration are not affected by the new AKS v2 experience.
1414
15-
Azure AD v2.0 is designed to simplify the Azure AD v1.0 experience, where users were required to create a client app, a server app, and required the Azure AD tenant to grant Directory Read permissions.
16-
In the new version, the AKS resource provider manages the client and server apps for you. Instead of using a persistent "Application Permission," the AKS resource provider uses a "Delegated Permission" via an on-behalf-of flow to get an access token to Graph API. Azure AD v2.0 enabled clusters use a limited scoped Graph API privilege (GroupMembers.Read.All) to query group membership only when the overage indicator is present (when there are more than 250 group claims).
15+
Azure AD integration with AKS v2 is designed to simplify the Azure AD integration with AKS v1 experience, where users were required to create a client app, a server app, and required the Azure AD tenant to grant Directory Read permissions. In the new version, the AKS resource provider manages the client and server apps for you.
1716

1817
## Limitations
1918

20-
* You can't currently upgrade an existing Azure AD v1.0 cluster to Azure AD v2.0.
19+
* You can't currently upgrade an existing Azure AD enabled AKS v1 cluster to the v2 experience.
2120

2221
> [!IMPORTANT]
2322
> AKS preview features are available on a self-service, opt-in basis. Previews are provided "as-is" and "as available," and are excluded from the Service Level Agreements and limited warranty. AKS previews are partially covered by customer support on a best-effort basis. As such, these features are not meant for production use. For more information, see the following support articles:
@@ -74,7 +73,7 @@ When the status shows as registered, refresh the registration of the `Microsoft.
7473
az provider register --namespace Microsoft.ContainerService
7574
```
7675

77-
## Create an AKS cluster with Azure AD v2.0 enabled
76+
## Create an AKS cluster with Azure AD enabled
7877

7978
You can now create an AKS cluster by using the following CLI commands.
8079

@@ -117,7 +116,7 @@ A successful creation of an Azure AD v2 cluster has the following section in the
117116

118117
The cluster is created within a few minutes.
119118

120-
## Accessing an Azure AD v2.0 enabled cluster
119+
## Access an Azure AD enabled cluster
121120
To get the admin credentials to access the cluster:
122121

123122
```azurecli-interactive
@@ -135,17 +134,19 @@ aks-nodepool1-15306047-2 Ready agent 102m v1.15.10
135134
```
136135

137136
To get the user credentials to access the cluster:
138-
137+
139138
```azurecli-interactive
140-
kubectl get nodes
139+
az aks get-credentials --resource-group myResourceGroup --name MyManagedCluster
141140
```
142-
143141
Follow the instructions to sign in.
144142

145-
**error: You must be logged in to the server (Unauthorized)**
143+
You receive: **You must be logged in to the server (Unauthorized)**
146144

147145
The user above gets an error because the user is not a part of a group that has access to the cluster.
148146

147+
## Next steps
149148

149+
Learn about [Azure AD Role Based Access Control][azure-ad-rbac].
150150

151-
151+
<!-- LINKS - Internal -->
152+
[azure-ad-rbac]: azure-ad-rbac.md

0 commit comments

Comments
 (0)