Skip to content

Commit ab54d85

Browse files
Merge pull request #267620 from JnHs/jh-arck8-entraimages
update images with correct naming for Microsoft Entra ID
2 parents 426026c + 7d42125 commit ab54d85

File tree

4 files changed

+6
-6
lines changed

4 files changed

+6
-6
lines changed

articles/azure-arc/kubernetes/conceptual-azure-rbac.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,19 @@
11
---
22
title: "Azure RBAC on Azure Arc-enabled Kubernetes (preview)"
3-
ms.date: 05/04/2023
3+
ms.date: 02/28/2024
44
ms.topic: conceptual
55
description: "This article provides a conceptual overview of the Azure RBAC capability on Azure Arc-enabled Kubernetes."
66
---
77

88
# Azure RBAC on Azure Arc-enabled Kubernetes clusters (preview)
99

10-
Kubernetes [ClusterRoleBinding and RoleBinding](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#rolebinding-and-clusterrolebinding) object types help to define authorization in Kubernetes natively. With Azure RBAC, you can use Microsoft Entra ID and role assignments in Azure to control authorization checks on the cluster. This allows the benefits of Azure role assignments, such as activity logs showing all Azure RBAC changes to an Azure resource, to be used with your Azure Arc-enabled Kubernetes cluster.
10+
Kubernetes [ClusterRoleBinding and RoleBinding](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#rolebinding-and-clusterrolebinding) object types help to define authorization in Kubernetes natively. With Azure role-based access control (Azure RBAC), you can use Microsoft Entra ID and role assignments in Azure to control authorization checks on the cluster. This allows the benefits of Azure role assignments, such as activity logs showing all Azure RBAC changes to an Azure resource, to be used with your Azure Arc-enabled Kubernetes cluster.
1111

1212
[!INCLUDE [preview features note](./includes/preview/preview-callout.md)]
1313

1414
## Architecture
1515

16-
[ ![Diagram showing Azure RBAC architecture.](./media/conceptual-azure-rbac.png) ](./media/conceptual-azure-rbac.png#lightbox)
16+
:::image type="content" source="media/conceptual-azure-rbac.png" alt-text="Diagram showing Azure RBAC architecture.":::
1717

1818
In order to route all authorization access checks to the authorization service in Azure, a webhook server ([guard](https://github.com/appscode/guard)) is deployed on the cluster.
1919

articles/azure-arc/kubernetes/conceptual-cluster-connect.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: "Cluster connect access to Azure Arc-enabled Kubernetes clusters"
3-
ms.date: 07/22/2022
3+
ms.date: 02/28/2024
44
ms.topic: conceptual
55
description: "Cluster connect allows developers to access their Azure Arc-enabled Kubernetes clusters from anywhere for interactive development and debugging."
66
---
@@ -13,9 +13,9 @@ Cluster connect allows developers to access their clusters from anywhere for int
1313

1414
## Architecture
1515

16-
[ ![Cluster connect architecture](./media/conceptual-cluster-connect.png) ](./media/conceptual-cluster-connect.png#lightbox)
16+
:::image type="content" source="media/conceptual-cluster-connect.png" alt-text="Diagram showing cluster connect architecture.":::
1717

18-
On the cluster side, a reverse proxy agent called `clusterconnect-agent` deployed as part of the agent Helm chart, makes outbound calls to the Azure Arc service to establish the session.
18+
On the cluster side, a reverse proxy agent called `clusterconnect-agent`, deployed as part of the agent Helm chart, makes outbound calls to the Azure Arc service to establish the session.
1919

2020
When the user calls `az connectedk8s proxy`:
2121

-294 KB
Loading
-527 KB
Loading

0 commit comments

Comments
 (0)