Skip to content

Commit ad95e6c

Browse files
authored
Merge pull request #102570 from laurenhughes/aks-aad
Add Azure AD role info
2 parents 4420899 + e04cfb8 commit ad95e6c

File tree

1 file changed

+12
-7
lines changed

1 file changed

+12
-7
lines changed

articles/aks/control-kubeconfig-access.md

Lines changed: 12 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: mlearned
66

77
ms.service: container-service
88
ms.topic: article
9-
ms.date: 05/31/2019
9+
ms.date: 01/28/2020
1010
ms.author: mlearned
1111
---
1212

@@ -31,21 +31,26 @@ The [az aks get-credentials][az-aks-get-credentials] command lets you get the ac
3131
The two built-in roles are:
3232

3333
* **Azure Kubernetes Service Cluster Admin Role**
34-
* Allows access to *Microsoft.ContainerService/managedClusters/listClusterAdminCredential/action* API call. This API call [lists the cluster admin credentials][api-cluster-admin].
35-
* Downloads *kubeconfig* for the *clusterAdmin* role.
34+
* Allows access to *Microsoft.ContainerService/managedClusters/listClusterAdminCredential/action* API call. This API call [lists the cluster admin credentials][api-cluster-admin].
35+
* Downloads *kubeconfig* for the *clusterAdmin* role.
3636
* **Azure Kubernetes Service Cluster User Role**
37-
* Allows access to *Microsoft.ContainerService/managedClusters/listClusterUserCredential/action* API call. This API call [lists the cluster user credentials][api-cluster-user].
38-
* Downloads *kubeconfig* for *clusterUser* role.
37+
* Allows access to *Microsoft.ContainerService/managedClusters/listClusterUserCredential/action* API call. This API call [lists the cluster user credentials][api-cluster-user].
38+
* Downloads *kubeconfig* for *clusterUser* role.
3939

4040
These RBAC roles can be applied to an Azure Active Directory (AD) user or group.
4141

42+
> ![NOTE]
43+
> On clusters that use Azure AD, users with the *clusterUser* role have an empty *kubeconfig* file that prompts a log in. Once logged in, users have access based on their Azure AD user or group settings. Users with the *clusterAdmin* role have admin access.
44+
>
45+
> Clusters that do not use Azure AD only use the *clusterAdmin* role.
46+
4247
## Assign role permissions to a user or group
4348

4449
To assign one of the available roles, you need to get the resource ID of the AKS cluster and the ID of the Azure AD user account or group. The following example commands:
4550

4651
* Get the cluster resource ID using the [az aks show][az-aks-show] command for the cluster named *myAKSCluster* in the *myResourceGroup* resource group. Provide your own cluster and resource group name as needed.
47-
* Uses the [az account show][az-account-show] and [az ad user show][az-ad-user-show] commands to get your user ID.
48-
* Finally, assigns a role using the [az role assignment create][az-role-assignment-create] command.
52+
* Use the [az account show][az-account-show] and [az ad user show][az-ad-user-show] commands to get your user ID.
53+
* Finally, assign a role using the [az role assignment create][az-role-assignment-create] command.
4954

5055
The following example assigns the *Azure Kubernetes Service Cluster Admin Role* to an individual user account:
5156

0 commit comments

Comments
 (0)